Analysis
-
max time kernel
841s -
max time network
845s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 23:09
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20241007-en
General
-
Target
sample.html
-
Size
271KB
-
MD5
65067343a0fb690e35528cad8d3fbcc1
-
SHA1
57bb72bc1672bc315976b82fee4b2d1da0569357
-
SHA256
955546ead2c45b61d473789b97357a227a64fe89581ca237f7f01429ed8d93df
-
SHA512
474a9651b22fd8e1fad4ef766f67cb22cf7e4311554895a2a2ae64fdcdaa0ebed9b15d76cdfafcbb1004a7a1a332ff3fbe1bbfa287ece667aecf3f29cdda6939
-
SSDEEP
3072:bcVbSXrVgRvLDuHLXaZZtjI/A4ll159t43p5UHjWsiIyVgy6AwtN+T5/jw9:kKgRvurXaZZFI/H9m5UHOIyuww9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 3088 msedge.exe 3088 msedge.exe 876 identity_helper.exe 876 identity_helper.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe 1000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3088 wrote to memory of 1588 3088 msedge.exe 83 PID 3088 wrote to memory of 1588 3088 msedge.exe 83 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3988 3088 msedge.exe 84 PID 3088 wrote to memory of 3508 3088 msedge.exe 85 PID 3088 wrote to memory of 3508 3088 msedge.exe 85 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86 PID 3088 wrote to memory of 4492 3088 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8736146f8,0x7ff873614708,0x7ff8736147182⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 /prefetch:82⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,17640339565779400839,15878944066976565138,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5544 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
1KB
MD596c0a2890841ffa45047d71abeee5dcf
SHA15a66424eeb286675cb67f9ad5374df0e352cb019
SHA256f485674a372f99477ec751609d0d76ffcc67a15f810be6f988c7ead41d51dc5e
SHA512f6752e603d8883ed9232ea0b1e9e48e2e9666fc646a05710128f5e7a7e7ba60b9d2599fa3d023df6a929a7f4e41b8885492b8a7e88ece607d30e4a8acdf7cb4d
-
Filesize
1KB
MD5837f230a296119f225280077fe571911
SHA1516a85fbb381a82875d0d682032b0531eea2f7ae
SHA2562bc9d97f10d05e284cc7f8e3a3c3a39ee45c019f9fea0c7d7260ac0ad9020f40
SHA512571719b53b290623bfbcd1574fcf3c062b8f0ea45423048913e84e093189a53b65662de81ee3b60fd88e05b75dbad4a15bee78a50fd8a8c92b746a2d3b73d055
-
Filesize
1KB
MD51e9c48933fe8fc6837362134cf19b3df
SHA1c2a03abadfecbc97c1e07e9449c01e52e4f25e3c
SHA2567e58c6a6f1d3576f60f0987f528b7f86c9fd26aa1bc94eb1fd9afeaab2224885
SHA512abcc09d41ac179628744f2f22695da64e0b3bc64256570f525920a8e19755ba862f2aea8f31bf7e76c88181d3d7e2e20da865f2e7fc40f1bbd6a2e1d405f9a8f
-
Filesize
1KB
MD58641aff833ae81665a72685444f77a18
SHA1a654cd856ac4886dde5c96c339bfa53ede51fc5b
SHA256d2e670583602d1ce430dd5c1a546599978cc8cf105c296921d483d424585f4c4
SHA512a0fabd8a8ccf802c709efbc3f6b501245b67db8e3893806da5ae31d8fd303009cec4ea5c9e7558a0cc64f486641c151b83f84aa5e57c79d4bddf7bdfade6e0be
-
Filesize
1KB
MD5c8074d108e060dcb2cf39c666ff04955
SHA1f8b7fb56f8d327bc1dc5d55a337a51c15f490be3
SHA256b02e841784ef0fa7c55b9ca605caa716f4f1b76eb0bccaf293b4f178e96ea17b
SHA512e27f5ed44860c6da90381effcd9849fb96db860faa5030f386c7084252dc359eb6ab460fc72e0d27c4c70935c13a4456889728c5bafda248a762ca663404a1c8
-
Filesize
1KB
MD5c217d3e7482630ddbc785da77f328f74
SHA19036f8c413f3bd7d3373a87d16a4539d919059bb
SHA2563cfa5640b1f748ccd8948b5da6ba66dcf20cfc98c7dbbac1cef33356b6d0f1ea
SHA512861b7b985669836f3e5744ec3cb8d2c2f565763905203a36a6c5010af839322bc58b412002fc4a5c6e01f7b7eeac3636667bd1906f06cf623d6d816bb4a81e1c
-
Filesize
5KB
MD5a967f2bbcf75727ab023d2eae2826fd1
SHA1b467800f7d175380110a0064ead6875bd1a3345b
SHA256bf2abd2474475d9b58b0f6f506ff77fb34f5f29a43064cf1f2d89de1f7009ca9
SHA5126e0bbb943b75fe56b56a774eaef4249bf8dd43df13c0fc71a2d1e7963c60bf5ffc3beb6309fa5800cfd32b301fc2520362f69f4a0b62cb42420a5adcf679717a
-
Filesize
6KB
MD572df5fca08b5d5d37eabfc17ea36639d
SHA1eda2b12a5f9b5b9b0542dba1b0825f31157951c0
SHA25662e0ba4927b7bb360bf3cd81f6a95a1c66f3058b086c87e4d7c34e7a03a1aa15
SHA512d80b7a77fefd456d87b2a85812b7ea49c4aa79e582c9cfed34dea2f9de68bf4c21047f0ba8737c08cf43f2250a706d391bfd7993318a8973c35d059275b53366
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD52a74f15663f5ded7aa1719d4d1278691
SHA1c3294fa3a8fedacf202133d49dc3c3d0fc118baf
SHA256d645ea3c8bc561f9eaa9fa2cff1929cd339d259f743487baface01ea88e5f81f
SHA5125204808ea9c3c11efd5270d04e87bf14d05e116e97609fcfa64baa1a0a368a950477741cbbfb87e21f0b06cad48ac705d1bdf62834b0bf3ae72191f341bbfd98