Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
View_alert_details DB60.html
Resource
win7-20241010-en
General
-
Target
View_alert_details DB60.html
-
Size
4KB
-
MD5
7ebd6535cc1b817ed3b8382f903bfbc4
-
SHA1
3d4a5327160b697d3a2745d9b3088625d1419af6
-
SHA256
ee71d933f6a7ec7ed7e24205dfeba1ec2c3d60a29747c5bb71feb52b1f7c4986
-
SHA512
5321dfb6f3d6cd811176839c9c7b2da01eadb6cfde39d8fdbb7a92b134f3f9342d3421d5dc362927724c94d47914f803b3cdc3c2766a1d478c19e9c78e5368f1
-
SSDEEP
48:om7QQa9HMldj5woVZPcD351VT9/TDDEuAVDKGNr2fppggdRYG409/dG5kv3THSGF:USxPk/RAVDo7KBoTHSGMvZHw
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid Process 4908 msedge.exe 4908 msedge.exe 2720 msedge.exe 2720 msedge.exe 3260 identity_helper.exe 3260 identity_helper.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid Process 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 2720 wrote to memory of 2248 2720 msedge.exe 82 PID 2720 wrote to memory of 2248 2720 msedge.exe 82 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 2688 2720 msedge.exe 83 PID 2720 wrote to memory of 4908 2720 msedge.exe 84 PID 2720 wrote to memory of 4908 2720 msedge.exe 84 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85 PID 2720 wrote to memory of 2500 2720 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\View_alert_details DB60.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdac1d46f8,0x7ffdac1d4708,0x7ffdac1d47182⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,3838221796590837251,9791367557898396790,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
515B
MD5e22165a7ae7b8e7add8836a9504e81a6
SHA1660d904878803d16f4eec72b986f3290c687a3bc
SHA25649d6f715c7e65c91cdf38f1d4f7a3326dc0d45a45c609f0ec51e3576c868d196
SHA512c699e64164457ee7bfa3674ec2a2cabb8381ca85e331e197c5a9d2e65ba6e5f93e06ed4a07cd94fb6dc45668b75058ace6a1a7c6c103e2ec4ab2ab0f3789ea31
-
Filesize
6KB
MD58ac1eae950efc290672c79cdb8c86551
SHA19f7fe3eb8d07b2e6855c0d58cf5e82035dbb1110
SHA25699793f05cf49a29cbed44619cca53d949fb736fe0d8a90b0d29455ea8fbf8edd
SHA512b3ed9631ff371cf95c556251a1cf1963f24ad5ab78d5776750f7c02916ce72fa15b83553e886da9144c2259fdd71b1f47889884d97d748a7623a7004e256c077
-
Filesize
5KB
MD58467c0742e2acf28b770a6260efcc625
SHA1eaa96f35ae651a2f7bcf2097817b52e7ad164ea9
SHA256f26f2fa2b81949b43004b7a44da539969b4fb64f32070706a3784936785817e9
SHA512ba600e6f7db119cd72a4b5e8579e9b2203901489a8da901f14f7a2e58dc9d81d57fd4ade1782c76732aa927a8e948de84d1689a71f91a8f9621d3d207af40aba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dfde3f714bcfc46eade400d0cde4b48f
SHA18eaaa780950fdc2535d10e1e8a8e30b716b6f537
SHA2564c2cffa0061078ce17c266f682adcde1f5b195b352a74903b59c0ed650e8d83f
SHA5122633e71036273b3e0ec424f2f2481d998bbb49e4586de5134006f63dc3b229edb4cc40bdb542b5a43b737527bccc37ce1ad62886cd12b5ab69a8b817b0f90fd3
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e