Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 04:17
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
General
-
Target
sample.html
-
Size
801KB
-
MD5
ec3d6052056c10ec6244cfc4685bc756
-
SHA1
193dadf75581a8335c65c73b177a6ade689910dc
-
SHA256
aff0d5062bc4b3d1736920fa984701b5848c1e9053a0bb58668ead05dfd5eb35
-
SHA512
73bbc7d224d550ecaa4661d30213ce714805eaaeab97818c72cf9401387610bcc7e071430aeb30c15cb9e61e05314963e32c14f8a6b9371a03cd4595decd0437
-
SSDEEP
12288:u02eu0bHs9YnyQbxr5eVNvYhOH6WtAykQAsmBhs5Py6MWe9oLqdsS05P26kGi62J:u0257HS
Malware Config
Signatures
-
flow pid Process 13 1236 msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 4020 msedge.exe 4020 msedge.exe 1560 identity_helper.exe 1560 identity_helper.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4020 wrote to memory of 2360 4020 msedge.exe 83 PID 4020 wrote to memory of 2360 4020 msedge.exe 83 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 4956 4020 msedge.exe 84 PID 4020 wrote to memory of 1236 4020 msedge.exe 85 PID 4020 wrote to memory of 1236 4020 msedge.exe 85 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86 PID 4020 wrote to memory of 4748 4020 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc0e546f8,0x7ffcc0e54708,0x7ffcc0e547182⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Detected potential entity reuse from brand STEAM.
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2936 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1796 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2000 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5824606280310401372,11620829196954171736,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
452B
MD528660d79694198bc91afaef5ab5d40e3
SHA1ccbdd1392e2c8ea67b627e077ed10afaf4c1ec4f
SHA2561cdc0854b900204fbeef36b28934d5a768db49e75efa3c1d83d27906371c41b5
SHA5121cdd193adb89bba83caec537506ef3606c2687db82a338d7c3a8ec6b86ad5a9fc336d5e51cbe7df965c8349f22a8e166f31c45c2c1655b9ee0035c0a561a479a
-
Filesize
5KB
MD5536a166682baa87758bc8062b475496f
SHA1be6b66ea489e6a96ea2b7ca8de435e3889d02d18
SHA2562eb3adebb8987279c8b64d7ee9fff81501e0f683502ac896c641ff3f82d21093
SHA5124353d864232b34a5b3d00cfa635c2585e006838bc2b052af341b4b85049407b0c25169fbe537bf969a9208dc28f9001ac9bc0549b151fab9be9a3b4b33f72e88
-
Filesize
6KB
MD516c2e777e5a9ef108f42a4ac634c079b
SHA1108517db0f952fb11b60344d76c46717c0792495
SHA25604aaf11c28473d20b57c6f9db03b640cad94ca2015b621d3d687edeefdb8e91d
SHA512ca4cbaacd6abf45ae977948a3d99a98b07d3a85acee4944e82166b6e7e4eeeba0cce7cf2660c4b3a045dc737014b5559f4c7611ad8957d6ef81f081e75401a79
-
Filesize
372B
MD5a84691e5867a54d207812eab1297b523
SHA15d5a119ab2ca45dd7681bf0faa8484530a171457
SHA2561812d2f7a76b5c96b14e027d678fa60163206d51204933446007a64bf91e22e4
SHA512e427c80860790ba7dc886001e8dfb0f96a95bfce6a5e0739af502014ac40f3c83009e73a8e64c659119cc686253baf61e2ee6e97ddce09368b421740c1621988
-
Filesize
372B
MD5e4da2c87176f178fd08c94ce07c6e3b8
SHA1b996f08858833184b23a4dae6ea4c44daa5417e7
SHA2566f1246e8ae1c96f23a099d3cb9696a33aec663bc5da3dc09695d241ecb5290bd
SHA512446a982001a1686e743805974bd6df6c4ac69a2487b2b25ad813f4b417e09018ff9048e9c7c752fd9b44ba9ab3237e1f0561dd60d0c128fc24cd473576da502e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54935ce61604c06e82bcdbf2d7d8d9a58
SHA1a34dd56e5abf8ee18e658c6722bec1b17f124751
SHA2564e8ab227f8993c122d3f3d46207984158542266466ea683da573bc0766957787
SHA512c8099e67cfddf8205687a38b6105e6357b744d4b230024c9b9400133a30af3903aeb3ebcb344cea81fc93a470fe6f43ed0fca74e0ae129d63cef26672a3275b0