Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:11
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20241007-en
General
-
Target
sample.html
-
Size
21KB
-
MD5
f16a080003090525d3661cdc604bedc4
-
SHA1
7be2b5d8fc911e97ce94b89735ed5ce044e40dd1
-
SHA256
a3e42103393d8a03a7a0691d7eff7e267e01e7c91887589cd0e4ef6c767d6885
-
SHA512
b387b6469e43d9a66024c098941e06f78c3f233b430a88753b3f0b5019fbc8b984250196644d1a7004feaf8cc16e5e568e0e0119c99fb62703c6355f2fb9aa73
-
SSDEEP
384:HSFpvs2uDcCkedKaysiLYLaboULC2wUFV/1RFKvMotdvu3hl:Ho9Dukedu/boEwUF0M+dvahl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 2696 msedge.exe 2696 msedge.exe 1656 identity_helper.exe 1656 identity_helper.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4528 2696 msedge.exe 82 PID 2696 wrote to memory of 4528 2696 msedge.exe 82 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 2308 2696 msedge.exe 83 PID 2696 wrote to memory of 4460 2696 msedge.exe 84 PID 2696 wrote to memory of 4460 2696 msedge.exe 84 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85 PID 2696 wrote to memory of 4584 2696 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8658546f8,0x7ff865854708,0x7ff8658547182⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 /prefetch:82⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,16240448346266853477,9698852370444471105,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
887B
MD5ed29271a3c1ab3a14ce5030ee8d1b55a
SHA19630debb42d179ee14f5f8fffe1a01097c96b9eb
SHA25692b2c080332fb56e593955258e893415677b66be2628e2dd45c643f40b734501
SHA512ad32fda572c323fd781c6636e739a0e8524d74dc08ece2809aba7adcb5e82cac16eaacbbe8b44a74969385abb514a216e4cc0f448d07b2d138c4e75b8edf686a
-
Filesize
5KB
MD5e6a1c21d03c72f849f02d76d3cbdc4fd
SHA19435552c5cc69c3eeb228c44b972e7e49796cbd7
SHA256d22cdc4250168bb4f1fa5521f2cf59a396690896290a59ad6e69bf762dfe8a4e
SHA512ae2dd3adfa3273d7ab5c73a20e4a12c25b0935f4533ef7a4928175c06002274c67d09f33a9f12c6849c9ff1ba593893c533595f96eef950da100fdcfdc276119
-
Filesize
6KB
MD535d19952ff436f8e625a51df921083c3
SHA136bc83a96ce4370b40c05e47eafff1dc5f437264
SHA2568be001325d8c23233908a0ecc62fb2f3ece4d34f0866f4cbf3faed1a51f89d39
SHA512c696cb9bfb428cc40b2de483e3a23672df010a27fbdc2b7550e1fd847b299cf50ec9c2c428e7397e24c2189ba92620d97d5dc7cfba47ffa963bbecf357dde090
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD53fc42b1d34eb8887b1df1714e4205ef4
SHA1bc28ccdb9d826b72cc8b62c8b9615983d1d68bd6
SHA2561a908b3441fe67e2e39b3f8bfecb7f5ccceef272e658626252cc220ff4cc4359
SHA512b1b6f6f49df14af899e54d412aa67488776034538a10c0c43f1685631068171c5ddb5b511c5136c42971cf0dc33302e080a491ac8d246be7d34fbcd9d25469f5