Overview
overview
6Static
static
39553绿色...��.htm
windows7-x64
39553绿色...��.htm
windows10-2004-x64
3setup_iesuper.exe
windows7-x64
3setup_iesuper.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3MicroBlog.exe
windows7-x64
3MicroBlog.exe
windows10-2004-x64
3iesuper.dll
windows7-x64
6iesuper.dll
windows10-2004-x64
6template.htm
windows7-x64
3template.htm
windows10-2004-x64
3淘宝特�...��.url
windows7-x64
1淘宝特�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
9553绿色软件站.htm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9553绿色软件站.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
setup_iesuper.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
setup_iesuper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
MicroBlog.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
MicroBlog.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
iesuper.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
iesuper.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
template.htm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
template.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
淘宝特价打折区.url
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
淘宝特价打折区.url
Resource
win10v2004-20241007-en
General
-
Target
template.htm
-
Size
2KB
-
MD5
b5f7929aaad1832ab16759ab11be8f99
-
SHA1
911bb0bef1a0e6c0c7a88cd8c1284e49383384f7
-
SHA256
fab64962f2f66416217be0d8df3771c7c1e069451b5f5f093d51a7d549075db1
-
SHA512
9d24abc4190a1769b1d9e95b4d7423c38d68c38cbcf135720a94b415cf5c45b391327852696b6eca7a3c4b71f880b67d9ed3c10a50758ea0e2e3c43737221157
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2524 msedge.exe 2524 msedge.exe 4768 identity_helper.exe 4768 identity_helper.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 3120 2524 msedge.exe 84 PID 2524 wrote to memory of 3120 2524 msedge.exe 84 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 1048 2524 msedge.exe 85 PID 2524 wrote to memory of 2272 2524 msedge.exe 86 PID 2524 wrote to memory of 2272 2524 msedge.exe 86 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87 PID 2524 wrote to memory of 2440 2524 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\template.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1d5946f8,0x7ffc1d594708,0x7ffc1d5947182⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3692 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,2809062623937914472,2392897755613193021,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
6KB
MD52312064012438d3deddc1bacaefb62cc
SHA1a460578b9e4c79e0f45d83a8a02a0316b1aba34a
SHA256bee1f6fc34ce0a7fb48976d5c97b8d7d012a6f480be8ae372569f7825a7a170d
SHA5124fd2c7958c01468957af342bb7e1e881e24f5ded65adb6731e02a615e54b99c7f1196770df4395cca512f131f0f512bf0f6b258174685ac92655d82c86a7d0d2
-
Filesize
5KB
MD5198f7b0042474729d82f54b41efaf344
SHA15e8f0163cd0bb17a1760667925daa9f3555cee9e
SHA25631d204aebcffcb8740bf74aae78873f24d7ba68a1d3229e47703914bfa2978c6
SHA5122fd6d4c8e1fd4a8f94823712014439f4bce57588dfbba5dc349109489db5e3aa313238803cbac164bd4cc15bbb7a505b4e309e1f174729ad7c5508c0bf94a5f0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD51342823e82471a200dde2ce00e5c3572
SHA1e0c289614a50749ace5b39960d7d60aede1bc3cb
SHA256b10fa69ef87fa7cba3d79e4ff4e3383b26a747bdc8988b5cdf550095f912b429
SHA5129e77475f0b75fa0abe86b8ca9a4e608037cb6f73d9056a840a18cc1304f97f1f897e6774b146ec24e2e6182a600495da6a1a4064554282192931136ba0aa7843