Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 21:02
Static task
static1
Behavioral task
behavioral1
Sample
delo3m.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
delo3m.html
Resource
win10v2004-20241007-en
General
-
Target
delo3m.html
-
Size
41KB
-
MD5
a2c279ebac4ec9716c06e44ef21a7c33
-
SHA1
6f5952c168a15b3d48be16bbf553efda0cb8da76
-
SHA256
51f3d263fe29e827ce6a0a5b757ccfb851cb9014cd91a07fdc4ab79cdf651ad4
-
SHA512
e36739c17f2d940905b5d66a229d86bc41c9214a0769598d0a18625744136fe503ce68ad12ea079ff47d3d099c76f663ba635e958ec348a75f906cc6b87285ba
-
SSDEEP
768:6W+6vKIcxKCYhtrlejrhLfH/Uq4sQG8G6uiUA/fphdG7q:6yJYYhthejrhLfH/Uq4sQGdQphdG7q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 3232 msedge.exe 3232 msedge.exe 4924 identity_helper.exe 4924 identity_helper.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 3700 3232 msedge.exe 84 PID 3232 wrote to memory of 3700 3232 msedge.exe 84 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 3176 3232 msedge.exe 85 PID 3232 wrote to memory of 2988 3232 msedge.exe 86 PID 3232 wrote to memory of 2988 3232 msedge.exe 86 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87 PID 3232 wrote to memory of 2216 3232 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\delo3m.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff874cb46f8,0x7ff874cb4708,0x7ff874cb47182⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6480 /prefetch:82⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6460 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13727769392684977861,2199293362279453097,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD502a048894cdae08a4e64d8fe0fca9b7b
SHA1a9f04dafb5b2a8202cbd74125e72f48b22b1c684
SHA2561e227fdd98cffe52ddbe400fed339aac0b22949aa299854e76ca8cc5482b5a24
SHA51268c08203a9258e41ac070b9326d6ee82b0a9b1194b6bdd1db8ac193c7cadb32266571f78619c26fe323ea4fff3a37a245d6fc02edc58695c528ec36b26866f8a
-
Filesize
1KB
MD5257b958f9f0bb27db8f846e9677cd7f4
SHA185aeaa3f9e666899f4d3b433ad3c47481493a81b
SHA25663b8c7a0e027a2bd5472a82fc06bcc6df785db83847963a323a1653f058d7aac
SHA5124d6eeacaae165557e293ef033c160aed99dbbc3d6a68152556702fdfd38f7676561c26c5ddead46b1521dbb08672127724a4d81a16e37cf1a51364e0cf95dd37
-
Filesize
5KB
MD51adea2616ce79f1d7b6d9220be637240
SHA11669868c884409a34d67f713bb69a4fc1f3ecb81
SHA2566c80e2278d24f36f0a046e2459c7c829e470cf42ed04488d08b4e88ceb0bda34
SHA512a1630279ea1b7a5782dd3eb05c59fc2620ae37ca27467acf16ff20f1cb1cd204fc267ee1ea4176f885545e47acfa7edac8158cd1c03a664b5ca107c2f74905c6
-
Filesize
6KB
MD576c3fef40ee458dd3c34acb7fb9cdfdc
SHA1ca3092ce3e07b8967ef86214b79b50727994182e
SHA2564c8be551e100ac905d9f7d0da6e8570f1a826a297108196cf738ebee037bca34
SHA512cb3d7cac84ad97641d34b548b51570f57552d334a230d41bce9dc18aeae2a3058a5e7626edeeabf9dbcc5f5a809de779dd2e633d4b602e7e7110a9b22478d1ce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5df42789fd7f60397ed68e2b2d304d9ef
SHA18f8e387d48e138fe04c3f8041428c16ddfa7daeb
SHA256d3c287eb7ce89289b72ee53e45c05648e521da38d1c4dabe995885e9eb68f0c4
SHA51201cf35a3142976ac82fb13df402d587e2918992f95bcf6f329ca695d7c8bef12edca54c2d480e582992b76066cdb72379437489005fcc22bed932bf92062e96c
-
Filesize
11KB
MD56bbff31cc72f00051aae2307295fc514
SHA12d7abbab2306874c4f8797f242ad84611cca29ee
SHA256f336a05002f56da8abc7220ecd95e35d2fd2e68568ad5e16bf4aacd17a6fa632
SHA51273964759971c60e5c8977a47078a5e8606e6379ce895602b191002618d25b6523cc9bdaa403acd9919fdb77ba40f122e02578fe7bbaa6119201688bacf5aec3a