Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
absolute-uninstaller.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
absolute-uninstaller.html
Resource
win10v2004-20241007-en
General
-
Target
absolute-uninstaller.html
-
Size
19KB
-
MD5
881516d59f99c92682ee0ddcc4a2cc1c
-
SHA1
8898534bbf066e3423e6e789d1cd687f8b828154
-
SHA256
1f70c4c17ff9979900a31ac2ef40c8295d626ef78ce5058aea8759db209fafc1
-
SHA512
8accc6cb119a99916484fc3ecfbef9aeda5f38ab4b6a42559d654cf1ba64b02d974992b1c9de5c7b0a021c6d2bde890f5d1ab11d7d53fb4dae6301dfedacec39
-
SSDEEP
384:SIbIll6o/YvdFwyWhNCVy7q9SThLvDokhh:SIIll6yYVFwhhNCaQSThzDokj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 764 msedge.exe 764 msedge.exe 2476 identity_helper.exe 2476 identity_helper.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 764 wrote to memory of 4676 764 msedge.exe 83 PID 764 wrote to memory of 4676 764 msedge.exe 83 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 1884 764 msedge.exe 84 PID 764 wrote to memory of 4772 764 msedge.exe 85 PID 764 wrote to memory of 4772 764 msedge.exe 85 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86 PID 764 wrote to memory of 2352 764 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\absolute-uninstaller.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8983846f8,0x7ff898384708,0x7ff8983847182⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2584 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,2024593562918018327,5337982478914491120,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5620 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
1KB
MD540809359cfb8b870404e3ff8eaa9c5df
SHA17a101b83b31ff644ced1e351608f507ce7969204
SHA2564d04e6159e6ac8b21e3179dfbd6b6ba35c8037167cbf31bdb10aca5cabc762ea
SHA512cd96f4022e875199d53103f46dab5bed94b32b3c8adcb560f96805c72528cdf0b1b373a89b19abe9e4affd03cb126f11372816fae9464ef9c9becd04c6c3e141
-
Filesize
6KB
MD5315c6620620dd2739bb2c23570fc10fa
SHA15ef15b98e526a0e2108581c216dd349480bbb12c
SHA256b5b99722715b41bfbe45b58ece10112a33c0617031c739fdbb334f53358210a2
SHA512b0cfefbf01e154a4b24690909acbd78802c612e7d628866e25f989f5278f430375ec9fd35ffef9dfcd33ef2c8438e19ed898ccf90e30b7ef0f374cf7f546c542
-
Filesize
6KB
MD59a0ef10997935f1ab2fda08559834d4d
SHA17743da4abe1d527f075ead046eeec067c1f45b97
SHA25633188d1556196bfd4ed3b6b6d0eb339d6e557c205dde25429ff98eda7bef4544
SHA5128fe03075541a419d17af6a2b96187ecdc173d13b573950de64343a86c95590df7001bee694bc52cd488206e06e979edf473af03dc3df5c7b3c1665fb276c777d
-
Filesize
5KB
MD5112a0f4d8015b7e9724781e41ba58bfe
SHA17738e1aeee773846b099b9d397a62a6eb4d50293
SHA2568259980689fdbe11ac3f96ec35090246c8c4e5fdae68876a0287fc64011c4179
SHA51283b3c0f836d28f5631d2fc951b1be5e964a22c084d3c1064f7e23d72a3de3b0661efcf80e8715a29e91e577fd342fcaa32b75fd07a25eebb22c09fd0ae5bd7a3
-
Filesize
1KB
MD5497786df831bd9f4ec9e7aa78ce351d7
SHA11f52149de29d73d7ddc35649092aa8f4e8dc642f
SHA256a06c281d82fc0907b09a9385072a13c3e155c8f2e8a828f49785f8d0e0a0e77a
SHA51203876ab7f10c77dbc17daaf05f4d509b9cedfce76ddd86956dc64f72d7936f0b0db18e2ac5a8616fcfce38d93cb8e1f34068a41c5ff8b15032940f4b3e6ade0f
-
Filesize
872B
MD5482fb76e7f635481482a87be2043eaf7
SHA1d0792948585bf0f171aa244cadfdaf9b87ea1402
SHA256efd3f834444bdba7280920825e28106e55ae26152e9623e158650fe148ac80f4
SHA512421c97844fab4e5d0b77000fb86ed49a86b94a2faee9c58424b27b4f88ff6ba78ea217e7b3e5596244ba5c12b4b126cc38d1ed96a6251fb59684cf0fb20cdd2e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5721ededd48c6b03d112572992dd091c5
SHA1d3e1ddcc0e069a6bc21f218bd45c8092a17167d4
SHA256c0df1ea077fb4e6c05e1bd790f87eeb5cd09ccb9586224d9bf8f874596cafa90
SHA512d32b179a6b89dc202e89ca5e3dcabe2465f858417fe724bdbe95df74f39637a237ebe7b671cf9d17f6af03e7e63f6872f1cd69052ad0866d9ae15a1d2d45bfa3