Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2023, 02:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://surveycloud01.mindfieldonline.com/survey/selfserve/53e/2023065004?list=7&ftouch=unsub&source=I28202N
Resource
win10v2004-20230915-en
General
-
Target
https://surveycloud01.mindfieldonline.com/survey/selfserve/53e/2023065004?list=7&ftouch=unsub&source=I28202N
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 3000 msedge.exe 3000 msedge.exe 3200 identity_helper.exe 3200 identity_helper.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4756 4412 msedge.exe 83 PID 4412 wrote to memory of 4756 4412 msedge.exe 83 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 216 4412 msedge.exe 86 PID 4412 wrote to memory of 3000 4412 msedge.exe 85 PID 4412 wrote to memory of 3000 4412 msedge.exe 85 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87 PID 4412 wrote to memory of 4428 4412 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://surveycloud01.mindfieldonline.com/survey/selfserve/53e/2023065004?list=7&ftouch=unsub&source=I28202N1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb772a46f8,0x7ffb772a4708,0x7ffb772a47182⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3708 /prefetch:82⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9945875600208859005,7120777743515906719,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD54d16a9e84e356e669ea9c833b99b57bd
SHA1dbfbf09dcde680a7716f74c16f3884d0125a1473
SHA2568e3de9d896388d2a9713d6955f10f2583f4a8ac2a61ce2deeb89f9a0f7effea3
SHA512b84d86d509ffd9c331c3cde97ae1489ac5dc316cbd291265b73d2251d7f4752561c021a98cdd364f09e12fdd363f127ad44a904dac8905796bc4ad34c1051efe
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
588B
MD53b998381c8cfb2a9f9675be404458d57
SHA1c0a49ab002e5c76050a8e431da209cadc4cc5a8f
SHA256c27447217a6e38f93e6f163b6c9d854b164147e9299b6e62f7aba8934048dbf1
SHA512686ea3609013c0312c6d72f7e60d962016a31fa6b75c488a5b6d32b46c8fea9054e09db77131ea98cbe4c88d955be7d83bb8af67761d386292b030005f149dcb
-
Filesize
5KB
MD5c6ce8e9546afcd5878660bbbbc68d16c
SHA1aa4fedea4cfdd1c3aa50bc9e0435b754837c005a
SHA256a21773a64194e6f944a89e401c10f2a3fac39acfe3621722c36a7f6e5a7caff2
SHA512c5fa03de0b7d548f65039c1425bc4acb717ff2990ea611f348469d50dfceb5ce60966cfde25aaf2e1b72fce7d8333f257a7873d8fc32d749e105c41c2eaddad5
-
Filesize
5KB
MD52ce2b853d9ed8a63ce6d73e42c894a82
SHA19fe76a426ba7cadba401b8ceaa1e625a53a1724c
SHA2568db7fb0e9b52b435ab46f7a5045ea8042f7cbd01a57a816b9f93775c86e8eb0e
SHA512848ca3e0234192251975c3391bcc03c703318a5b79fd6e1209a1e8809ab321ddcac1200c7c53aafc94036f46d8244dbcbe0cdd70544e9f0428447c1a13b003e5
-
Filesize
24KB
MD5d985875547ce8936a14b00d1e571365f
SHA1040d8e5bd318357941fca03b49f66a1470824cb3
SHA2568455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf
SHA512ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51b8a4c83f480c57d4a7ed664b30955f8
SHA16c5a89e10c5b300674eca19f0f7dde2894705164
SHA2560665a68fba63e966d5a253d50e3fd559e143721b80f8584f766d1bf51c1eca1a
SHA512e3596adf10e7788ae545958799f5b5217b580d7b17e6440f498e54aea508a842ccca2f617fb837e0d78cadb85a6e1ef3dad4aa364a8e8a506b5d8df89db72c38