Overview
overview
10Static
static
10quarantine...K.html
windows7-x64
3quarantine...K.html
windows10-2004-x64
3quarantine...C.html
windows7-x64
3quarantine...C.html
windows10-2004-x64
3quarantine...24.exe
windows7-x64
4quarantine...24.exe
windows10-2004-x64
5setup.exe
windows7-x64
1setup.exe
windows10-2004-x64
7quarantine/ht.exe
windows7-x64
10quarantine/ht.exe
windows10-2004-x64
10quarantine...Yj.exe
windows7-x64
10quarantine...Yj.exe
windows10-2004-x64
10quarantine/pic5.exe
windows7-x64
6quarantine/pic5.exe
windows10-2004-x64
6quarantine...m.html
windows7-x64
3quarantine...m.html
windows10-2004-x64
3quarantine/random.exe
windows7-x64
quarantine/random.exe
windows10-2004-x64
quarantine..._2.exe
windows7-x64
3quarantine..._2.exe
windows10-2004-x64
3quarantine..._3.exe
windows7-x64
10quarantine..._3.exe
windows10-2004-x64
10quarantine....0.exe
windows7-x64
10quarantine....0.exe
windows10-2004-x64
10quarantine...r.html
windows7-x64
3quarantine...r.html
windows10-2004-x64
3quarantine...g.html
windows7-x64
3quarantine...g.html
windows10-2004-x64
3quarantine...t.html
windows7-x64
3quarantine...t.html
windows10-2004-x64
3Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 19:31
Behavioral task
behavioral1
Sample
quarantine/BSFiC9K.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
quarantine/BSFiC9K.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/ORaMflC.html
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
quarantine/ORaMflC.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/Setup_2024.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
quarantine/Setup_2024.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
setup.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/ht.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
quarantine/ht.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/m5UP2Yj.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
quarantine/m5UP2Yj.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
quarantine/pic5.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
quarantine/pic5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
quarantine/random.html
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
quarantine/random.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
quarantine/random.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
quarantine/random.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
quarantine/random_2.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
quarantine/random_2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
quarantine/random_3.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
quarantine/random_3.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
quarantine/rh_0.8.0.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
quarantine/rh_0.8.0.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
quarantine/sgu7U1r.html
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
quarantine/sgu7U1r.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
quarantine/xB2HL9g.html
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
quarantine/xB2HL9g.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
quarantine/xclient.html
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
quarantine/xclient.html
Resource
win10v2004-20250217-en
General
-
Target
quarantine/xclient.html
-
Size
6KB
-
MD5
307dca9c775906b8de45869cabe98fcd
-
SHA1
2b80c3a2fd4a235b2cc9f89315a554d0721c0dd1
-
SHA256
8437bd0ef46a19c9a7c294c53e0429b40e76ebbd5fe9fd73a9025752495ddb1c
-
SHA512
80c03f7add3a33a5df7b1f1665253283550dac484d26339ecd85672fb506dce44bd0bf96275d5c41a2e7369c3b604de377b7f5985d7d0d76c7ac663d60a67a1c
-
SSDEEP
96:k2J/SNi/FLQVTLKCGWz5ln59Jy0jRdoMVZTdI5:k2pV2RKCxDnxyTMVZT0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 1180 msedge.exe 1180 msedge.exe 3032 identity_helper.exe 3032 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1180 wrote to memory of 3420 1180 msedge.exe 85 PID 1180 wrote to memory of 3420 1180 msedge.exe 85 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1976 1180 msedge.exe 87 PID 1180 wrote to memory of 1480 1180 msedge.exe 88 PID 1180 wrote to memory of 1480 1180 msedge.exe 88 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89 PID 1180 wrote to memory of 4464 1180 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\quarantine\xclient.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3dc546f8,0x7fff3dc54708,0x7fff3dc547182⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,7136078739074248435,807304399087330609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,7136078739074248435,807304399087330609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,7136078739074248435,807304399087330609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7136078739074248435,807304399087330609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7136078739074248435,807304399087330609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,7136078739074248435,807304399087330609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,7136078739074248435,807304399087330609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7136078739074248435,807304399087330609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2444 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7136078739074248435,807304399087330609,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7136078739074248435,807304399087330609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2660 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7136078739074248435,807304399087330609,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5395082c6d7ec10a326236e60b79602f2
SHA1203db9756fc9f65a0181ac49bca7f0e7e4edfb5b
SHA256b9ea226a0a67039df83a9652b42bb7b0cc2e6fa827d55d043bc36dd9d8e4cd25
SHA5127095c260b87a0e31ddfc5ddf5730848433dcede2672ca71091efb8c6b1b0fc3333d0540c3ce41087702c99bca22a4548f12692234188e6f457c2f75ab12316bd
-
Filesize
152B
MD5e27df0383d108b2d6cd975d1b42b1afe
SHA1c216daa71094da3ffa15c787c41b0bc7b32ed40b
SHA256812f547f1e22a4bd045b73ff548025fabd59c6cba0da6991fdd8cfcb32653855
SHA512471935e26a55d26449e48d4c38933ab8c369a92d8f24fd6077131247e8d116d95aa110dd424fa6095176a6c763a6271e978766e74d8022e9cdcc11e6355408ab
-
Filesize
6KB
MD5b823dfeb2883bb208bdecc7cc0f9c9f9
SHA1e0fb2589f7ba194bb65b14c881e60f54c4a92774
SHA2565ea42c52f142e1a4bd397d1bc139bf83659c26ba476565c92ddd5fd4fab2117a
SHA512ca12f5fff5a89d50feb03dc15cb9dff7afd04b037dccda5a90b8b461c3dea7fd3f633b013754ad39a1db4e702b14fc2d4f0d7062c82bd78df7a6321eace71f2f
-
Filesize
6KB
MD5b9f8c1f581a670b25198bbe4cc4ff04b
SHA11bf69f419a588f3b33219f74cd5d8f670688b22a
SHA2565fdce88d50b4c0bcc8c511e3303edca136006c1535b7241877092b7268b51a42
SHA512c04be63aaa2f02d85b1c9657ab9057ec5259f4bc5aaeaabaee5fe1e8f62b40ea7014c899d27126687bf56448abe0ab3ff0aedb99b1b2a3a5a26e609c5192eb76
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD577ef9b065f66d588f299113baf35eecb
SHA118e252a9d515fcca59b1d5d8274e168495c42858
SHA2566bbda96828ff789ee78941ee52d5706571dd49d529fd221015d93d6d4f4c47c3
SHA5121193f632bc07e0d8a533f0ec77728d36bbfbd80f18e1e116d5659371513004eceb0817ffa88e76c523b7c7bf95979858a887ba4a719511ef1abf3732675e7415