Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 16:14
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20241010-en
General
-
Target
.html
-
Size
43KB
-
MD5
43f1f3c520e95f8091df0136e5343530
-
SHA1
4b4d6866d18316f22ef1ac45f83a9c40646e2127
-
SHA256
2cd0c999dfd10f9b18d133aea7d0736cf555205db6dfc01d4a2953e5a540176e
-
SHA512
b09ff7745607ca9b4b71049f7c5756986215d0a9b1fa428a9a7659d44fa5d6a1dcc68a7903b9ad8b067b998edcf25c68088b3dd0a88b0b1a70c0b181df3c73d0
-
SSDEEP
768:2IBpqhYGMpevT3x8gAts0B7B9TFXWt7aXfsW9l+X9hJYFnzOMD5QBdxaXfsW9l+m:jB8hYGMpevT3x8gAts0B7B9RC7aXfsWj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 4588 msedge.exe 4588 msedge.exe 2824 identity_helper.exe 2824 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 3164 4588 msedge.exe 83 PID 4588 wrote to memory of 3164 4588 msedge.exe 83 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 84 PID 4588 wrote to memory of 2716 4588 msedge.exe 85 PID 4588 wrote to memory of 2716 4588 msedge.exe 85 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86 PID 4588 wrote to memory of 3956 4588 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec32646f8,0x7ffec3264708,0x7ffec32647182⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2996 /prefetch:82⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,3457498225672768837,277089621885528160,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:2744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize552B
MD5af398ecc813c68f3e7220b6a5fd3bcb7
SHA18f9ec65d3ee9877528ed2f8e0e3516f65a1b85a0
SHA256c3de6dafa2d9a0ae67d8757aa39a591f6d0308c474d150e946b447914fe3c2c3
SHA512393bf911bece0b10b3f3d7da57f2924090e5a8e8f96d09ce59ec3f0cf8f6840f205aac82a886f8bb11894c0024cddf391c1d02a42736b5219183a768204490db
-
Filesize
523B
MD5c85db21ec14cb25e7f38c2202117dcf1
SHA1c3a172605d4aaf6fab8137791c2e48ff1033eae2
SHA2560628a4e0abb5f041cdca6df31b8a7bdd964987bd11035bde80479f1b24ae7bf4
SHA512c30093cb2d44f940a6d3b3d96dbdf2992d9c0358056cfd27260fa4588a54a3a25c8e092aadc1f3434e28cfdbd76a6a97dcde45d1e239191afeae2f535be4977b
-
Filesize
5KB
MD532d6b0e9ecd078a1b9a6762df954a3fa
SHA1beaa94b49ba190d23ab22e23ef719e7959341b1c
SHA2561c7709cc8164f4878385ddd2895fde5e1e420bf3adf07cd78918abb02c12c412
SHA51212ecd983a5f7ad899cd473bf8bf62e8b99259bfd83235c91076cbd80e6ac428382ab69d682dbff2179c71d458fcc61434b60c2e0f99a061bf69f8b4d0667cd2a
-
Filesize
6KB
MD5ef78ad38a08bb56323e528d95ddb279a
SHA17d7b10e5561fd9d951dd912ee10fed62410d7090
SHA256099325e1678d505fefb6e8abde087e8e6e73b8203f2d5490b95fc8dcbd4d4c63
SHA512ae5f12d0f9c087634a611ccaa29c5b3571004ba25a7540bbec5178a22dc2482e77000876dce6a990c3688116a67a3742e78384979f7db64ed318208c5ae42604
-
Filesize
6KB
MD541508242be1ce0e223a917ddccc5ce85
SHA14ed305fc82e60f7d6849eb9cfdee10660f32429d
SHA256d628c3796c5dd7fa28a03d33d4ae7962633872313e0d3565f5b79040fac4074c
SHA512c8d5f2034b5689f4abc04804cfb6421ba82969f4071d4b5e5c576273cc8977b88eed998c976fba44b62843fd4ff6a372957a43001eb50037dde3f605f3d78c31
-
Filesize
6KB
MD59755fb4378b3e1ca3946eacbac70549d
SHA154774eaa7b1c66dec8c5acfd7b43c2254a1535c2
SHA256bec64ebff04ea15c5a600080cf656ce894e588ff3d4f03bba731aac8937792d3
SHA512ae9a7adda4790cc0a22e1bf9e03e2fc2cb23051994e711aaa387f290bae6edd32f1913d91e1234f4604994f1367b67a03ec6ccc8119c66cfcd82dc3fd95b113a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59d9f3c32fa3611273da7539eae94071d
SHA19cd8eb20b113ecf5fd05ed6f0eeed0794e215504
SHA256b72cedd82b5ea7575336a0a6f2fe5c7e59a2985bb8b29ede47aae5d8906ccca1
SHA51250ea2bb166eec77cbd66ce1c936e446135f2359665de0facb7aa02ccc1145b72f79dea7990f7b022e2965c92d3eac086c06861260f2fd0bef47e946511ff4e9b