Analysis
-
max time kernel
65s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 13:46
Static task
static1
Behavioral task
behavioral1
Sample
attachment-1.html
Resource
win7-20241023-en
General
-
Target
attachment-1.html
-
Size
228B
-
MD5
e3b9a28a8536caccbcd94fb5d610d8dd
-
SHA1
25c54e735d36f30fcdf6300ddc191cb3ec4c3070
-
SHA256
3d5b88c59182097305c2fa6d6fc54963bc2d81b803250d4bdb777bcaee23bec2
-
SHA512
733c39bfba53c248ad8b5173adb9fcae5e9ed77a64649649c6e4b7f6c8de1de422230d4638b360e2acaa78df8ca94eba183ce5b7dd2927e0d8e2f9b7b6ea2545
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4756 msedge.exe 4756 msedge.exe 4860 msedge.exe 4860 msedge.exe 4836 identity_helper.exe 4836 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4928 4860 msedge.exe 85 PID 4860 wrote to memory of 4928 4860 msedge.exe 85 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 3888 4860 msedge.exe 86 PID 4860 wrote to memory of 4756 4860 msedge.exe 87 PID 4860 wrote to memory of 4756 4860 msedge.exe 87 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88 PID 4860 wrote to memory of 1272 4860 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\attachment-1.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1efb46f8,0x7ffc1efb4708,0x7ffc1efb47182⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9959027122113758834,5249247552676183275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:4396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\54ed4279-6281-43ee-ac2d-c644167c95a5.tmp
Filesize6KB
MD597746bdbbc18e31b494698c1f31f5242
SHA1034b7a44037a278887726329788dee596e5ed26b
SHA256b7e29ac41a73afeba2a854ffb2fc0c609cf52721b2a8883102923ecabd4751b5
SHA512390a22a0ff10cf134afe82fd00ab4af8fdc6434b6eeec9c815a9d3a2c1fe1f120c1d1f0d19a9a6ff55f379c6d1fd240d75071ab77ea2c64e4c2569deeff79906
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD55cec29d84df76f5445024b00a22ebbd7
SHA16943c6dffd92bb2a9ead6961fd388812ab5076d1
SHA256f6d46779e09f147288a6c4114ef25c532774a8d32784cc44b3db0374b7270acf
SHA512fd76636b7c2c7e34f69bc913d31f8f27f2cfb98f04362a2e47eb10e41446f7f7081e1d091eb27eb4ce25570e0d863f73876188f9ee2d81f0f143ab779977df08
-
Filesize
5KB
MD570dfa7f2e56aac05f8b19bd883bfcfc2
SHA14d88db96138795bd067cb8a1444a813126024904
SHA2564f437b6f1b4012fb7e502455a45d963df0f8e84b8f259cee43f1eb59a95da481
SHA51293c27db77f291df6e1f8439a43f9bf497dc09e384a5a541c286b91b55fa079195cd57e172804fc7cc722878b1b1f1de141ae9ed99d15bf74e1276768f56dc1d8
-
Filesize
6KB
MD5344f03a605eff039dd77938975c0ca76
SHA16cca80b3458ca6b4dba1b675300704f06299738a
SHA256ca6d77b1b84417e67b1ef85385eb9a0dd8dd6c635b51e4656bea6ff835b3979d
SHA51277679fc40d28ceb805bb82bc909bb76a2abd52b706d4b9c16b2ce33bcbd5a22601f0405ee405d4f721ca888f4dda03c127ec209cb09f6e9b7f238ed085c9bc70
-
Filesize
1KB
MD55e703d7146cadf5fed97bd7187001e9c
SHA1d9d438a683d24c9ed6bb2807b09d0998c1cc1274
SHA256f2e46b0855d6abe697e6a8848ab755fd112eb664c60196eadd609f0565cbb49e
SHA512016c62c2d102ab57ae3987b67fdceb4e15460c371ba678c2b31ed13744a57d4d2a193809f59dac723fa2730647ce1006401de6fe5fdeb4e7ae9013c7baf4a26a
-
Filesize
1KB
MD57da13e86203b1e63434cc43927d2e15d
SHA195968df9d25d7f8b4896495e667984ce14a7d3c0
SHA256deb9494c5fdbab11c87438ee04826035e59cb5bb3ce8374d4c75d61f3742bfa6
SHA512c7a13fd828569d64b55b05319f54f960f669cfc794d1fe763a8c640a2161fcd89226ed8dad787dcbe98c98a55c87489010268f3d962348a70abac81192f2afee
-
Filesize
204B
MD5a592faa15e178e7f0eecd0a2947ebdb3
SHA18926c32142cd770b85fb3f1ecb189da31035e47b
SHA256876a5dbe8edc10c3df54621fa80ee52f8bb604772de4acb68bf9af2c15e81a79
SHA5123c07c3c9bc635cbd4f3fb60df26033b632a6a1528ba7740aab7136c1f29a7996821331dcba376c441920da1de693084b6a89693fead881a608b01ad1f70bd34b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a52913e3078e57b762baf176c256ab65
SHA10e7bc06744758e2ac37a7e61891b153a05184946
SHA256aafe994b9f90d55cd096e7330b1423482dce7d5771af18a285276f589c7678d5
SHA512e5a770d26b2a933441888ba8780b220a1947271a5e42b6f6e42bbcb466bbf885cf926f9259afe9fb4f43f300307601064830450c3e70d1adaa85b5f5601fac6f