Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/10/2024, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
creed.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
creed.html
Resource
win11-20241007-en
General
-
Target
creed.html
-
Size
399B
-
MD5
ffe6e0a4f4698c18a7a3e66525b60f0c
-
SHA1
f350e449a97ed3da23083a8fbfd68c9ecbe68685
-
SHA256
7d74c605b962c9db5f8446bc6a51faac73d5230bbf8812669a55b72cdcc4255e
-
SHA512
29fcc4092a6cb3983705e8d01fb1d3f2120f3d3c2ab0b9b476a82d476324e11624a760306f61903b82a30005ef6ca78481c6448755cb82948bf232b5b547d463
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 5060 msedge.exe 5060 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 identity_helper.exe 3984 identity_helper.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4156 5060 msedge.exe 80 PID 5060 wrote to memory of 4156 5060 msedge.exe 80 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3140 5060 msedge.exe 81 PID 5060 wrote to memory of 3912 5060 msedge.exe 82 PID 5060 wrote to memory of 3912 5060 msedge.exe 82 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83 PID 5060 wrote to memory of 4876 5060 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\creed.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd0c463cb8,0x7ffd0c463cc8,0x7ffd0c463cd82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,13775976018392959984,266628662841576566,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e9a2c784e6d797d91d4b8612e14d51bd
SHA125e2b07c396ee82e4404af09424f747fc05f04c2
SHA25618ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6
SHA512fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1
-
Filesize
152B
MD51fc959921446fa3ab5813f75ca4d0235
SHA10aeef3ba7ba2aa1f725fca09432d384b06995e2a
SHA2561b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c
SHA512899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5d54daf382cc966399bb696efe3b5b2db
SHA1329536409d49039b6c14134cd02e6548973b3c34
SHA2564b573aa556a22dd693756a297d46d5133da6481c2f24a53c70ba565a683f31eb
SHA512cee260a8c9aff1856e614c5d37828dcee23f7990dd75f5f5600a457906779ddca5f608f7f460bd6d9e15d94025b08ff03a4b5f90aefc6437e8ca76c7692df6f4
-
Filesize
1KB
MD557671fe7fddab71b842e51f4c24c2272
SHA14e3a92bb4ea1707e507c34fa4d9ea3f88c2a3b36
SHA25656ad921315034d5e24acbbd39267cea951248f4e536e65fa8a243cf13389617c
SHA5121d07ce57593a3cc43f37a50160d0b94f99a1028db32ae65a29acf2ceac71781ec64aa133c097e5e076ac174567113c4c0fec4620b82c94982711275bba85ee9e
-
Filesize
5KB
MD55414ab985f98b0ee17838f9ad00cca05
SHA1e934b08384145945d7d8338afc79080acb0d4bc3
SHA25638f9981ec54b5ad72ec5bebf47d4edb0fafd96d2c46732a670129f02382d9ede
SHA51234238958fe56304010e5c8fae4e4a8cbc94889554e5b8594c18a296626ebfe18a620f2721877101bc932102a179140a641f5bece56b0215e8c0b6739e7f24263
-
Filesize
6KB
MD5c866e46384a3c53f6f894c143a9a3fff
SHA1405f64d931c092c2daca0f706aae4c610743ceb0
SHA256cac391ccddf7b100e8c44a4d8b051d50c96e7c40f8b24aec1810f0c4768f5613
SHA5122af0f04c9468c6eda67e1de9fc2ad68694620c1f4623cdeaa4cb5780866eb1d1c5d02359ab98af3f0aea4e219346f5a27f9b0b8d5c5302112c012b0342cdc154
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD531bed35347c0c483e677960b1fb111ea
SHA1d1b556ee44bc041ba53c6364401e337b4203d517
SHA256e4e1dc63a6f182eb04c62cd7496a41e9ce51ec7ce010a47f7eb986fe859ebc9d
SHA5122123f9f04db3977f472ea36af3545292bead33234d30feabb3adc16307eceba62468532af8f01f4465949234f8243d80d2422ac95546126bf5e5557811af48bc