Overview
overview
5Static
static
1AAMkAGVlYj...QW.eml
windows7-x64
5AAMkAGVlYj...QW.eml
windows10-2004-x64
35129033.png
windows7-x64
35129033.png
windows10-2004-x64
3VM_Transcr...f.html
windows7-x64
3VM_Transcr...f.html
windows10-2004-x64
3email-html-2.html
windows7-x64
3email-html-2.html
windows10-2004-x64
3email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
AAMkAGVlYjNiNzA2LTQzMTEtNDlmZi05OWE5LWIwODdlNmRhZGQzMgBGAAAAAACB6YGTmo7ZQqxWBA_VRAiPBwDCO0JJFRtyS4QW.eml
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AAMkAGVlYjNiNzA2LTQzMTEtNDlmZi05OWE5LWIwODdlNmRhZGQzMgBGAAAAAACB6YGTmo7ZQqxWBA_VRAiPBwDCO0JJFRtyS4QW.eml
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
5129033.png
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
5129033.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
VM_Transcriptac2a35aa5e3b341776ca4cef4eee55eb85797c6f.html
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
VM_Transcriptac2a35aa5e3b341776ca4cef4eee55eb85797c6f.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
email-html-2.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
email-html-2.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
email-plain-1.txt
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
email-plain-1.txt
Resource
win10v2004-20241007-en
General
-
Target
VM_Transcriptac2a35aa5e3b341776ca4cef4eee55eb85797c6f.html
-
Size
25KB
-
MD5
cd70881e47457944cc85bb60d249f040
-
SHA1
855b31a5733e8fe0e726bbb882c6c89e7116a8f8
-
SHA256
d10bff808f8669aaedfda5265f63bad8eea73b247689680a15c0e057ad15af1c
-
SHA512
78a0c474114515e04d46d0369b1b072d53cde060167e9d36e43931817eddf1709dc1b607c5139bb5ec01c4e1fe2ef97c46e7cb9a0b79442782079e2c6f661b72
-
SSDEEP
768:RqNo5L+s8vw7OcwItsfw75ivwG4OcAzjxc7oxGPe74sMyEVm2u5gMyHrTBT7r3uj:4No5LHVnrh9R9R9R9R9R9R9QUWWWWq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 1964 msedge.exe 1964 msedge.exe 1996 identity_helper.exe 1996 identity_helper.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1964 wrote to memory of 3820 1964 msedge.exe 83 PID 1964 wrote to memory of 3820 1964 msedge.exe 83 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 228 1964 msedge.exe 84 PID 1964 wrote to memory of 1432 1964 msedge.exe 85 PID 1964 wrote to memory of 1432 1964 msedge.exe 85 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86 PID 1964 wrote to memory of 4768 1964 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\VM_Transcriptac2a35aa5e3b341776ca4cef4eee55eb85797c6f.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccb0146f8,0x7ffccb014708,0x7ffccb0147182⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 /prefetch:82⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,106647875803891913,7871966578041133678,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD555d37ae4bacd07692da8709a4963c48d
SHA16b2b4ae5f236f5ecc81d36a4b979ab62d2f30c0d
SHA25663a8ebc3e613d04c5f64c5004abdc34d9258817e8e7c7f28126d9564a812c570
SHA512b509a45ef7ba033c4685b4955015932f301d39f1fe04dfe499929a67faba129e57b9ca2d22e32c72a54c1decf08b3c0220357184a0c013c1aa8979972a29a1ff
-
Filesize
1KB
MD5cdf675955fc5059ae8c255ba38201c80
SHA1775a6e3fd4b9db2436d259fa298cb621e4e65f79
SHA256151609d788519cf9962e30ddba438af4ade9b2aa173fb67933737b4a29dc15ee
SHA5125c13ba8d58d3f9679b98caa4f31ecd6c76086a0dd93b574b3953319a2ea89757d886ec47400cbcf35d3d1dbeae0a6dbed735a0c6aaa3c6af1d165298d4f41a1a
-
Filesize
921B
MD5732d4b24b125da3c991d6b3875dfaed1
SHA1bae19f2f295bcb7b8644392d1befda4faf91ad2a
SHA256203f5fcb044b32596a4b93d7bf1a047d20c5f85cf768698218699afd1b2e9a98
SHA5122e780f7765c49efdc24a6b3ae5020867649df5d07d9dfe50d9fd609871c1b4ed5f7dbdcd5c4a74f8584e6804bcd539b49c4043e96e16d0e2150ba871d7a62c47
-
Filesize
5KB
MD5c923a6ea9a4ac2ed335b85ff4e4e7726
SHA1d404b25606ff6e58d57a0615ac708bf595d97941
SHA256a320277afd14dfd1de839915a4ed3043eeddb52a9dcb7100cd6d303428caabc7
SHA512394cedd6456df6186c3cbb7c3282c1704735bfe6ac52b90f5091b486eb353b16746f13e8337020d53d5dc07e24e776732518a9e226e24b55d8126a12ab084476
-
Filesize
6KB
MD573f70880ea8dbc53fa49838ebcbeab19
SHA18ec92caa5ad8fffd3e08acd377e6104f5a05fa36
SHA2560346d7f4ddbde6ec1709b23c05c31c929eb34bf1cf4b625f45b5b9815e93b960
SHA51248cd951a0d3768095630c2be50f3dbcef038c747e5fa06e173fb305920743c4afcf5925f42c210e65a36046b8ccea979ae7c3dd0305a12b26a45ac95f1bb0ca7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54f806a974170ea5caca558809b65c866
SHA1c4aa51da30af3461585061f6092a468168c361cc
SHA25658d5f28b3c34b1bfe93c9ba53dab38f6b93c87ad967790c514543cf1b38bf77c
SHA512d89f5302cc84fa6d0109e60a8089e8418e9a497075ec4c300f957e92e27da12a6fc6e707dec65cfc586685b27ca10fcde3acd4d8f9626516125ab5a8ed7e40a8