Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 18:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://snhu.submittable.com/submit/5961397c-c868-47bf-bcf8-55f9249fbcb5/fall-fiction-contest-2023?utm_medium=email&utm_source=SFMC&utm_campaign=Remarketing&utm_content=em154658&sfid=0031N00002C0Z21QAF
Resource
win10v2004-20230915-en
General
-
Target
https://snhu.submittable.com/submit/5961397c-c868-47bf-bcf8-55f9249fbcb5/fall-fiction-contest-2023?utm_medium=email&utm_source=SFMC&utm_campaign=Remarketing&utm_content=em154658&sfid=0031N00002C0Z21QAF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4188 msedge.exe 4188 msedge.exe 1460 msedge.exe 1460 msedge.exe 3412 identity_helper.exe 3412 identity_helper.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 3204 1460 msedge.exe 83 PID 1460 wrote to memory of 3204 1460 msedge.exe 83 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 3772 1460 msedge.exe 84 PID 1460 wrote to memory of 4188 1460 msedge.exe 85 PID 1460 wrote to memory of 4188 1460 msedge.exe 85 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86 PID 1460 wrote to memory of 4112 1460 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://snhu.submittable.com/submit/5961397c-c868-47bf-bcf8-55f9249fbcb5/fall-fiction-contest-2023?utm_medium=email&utm_source=SFMC&utm_campaign=Remarketing&utm_content=em154658&sfid=0031N00002C0Z21QAF1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8a3246f8,0x7ffc8a324708,0x7ffc8a3247182⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2944 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,14200020111041000888,9932633090028422173,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4656 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD5cae693cb23cdc7a9b28de65e2de7cb84
SHA101836074e734a8f2399188d2818e7e64c77e7f6c
SHA25612a2d5e67a83931aafa19bf0b9c1fc5260b9c7d28a91ab4fa54741310da62365
SHA5121fbd8a4bb516f250e7a3072cc1f3a159c21fffe177549730b8922b01f2f1028fc46b3d4bce033b7cfd8108cd12ef12101e65b702f3abab50acbaf008991d9710
-
Filesize
7KB
MD54dde73eba4db2ec90f8bdd3689b06de5
SHA1c00ac8430c2d517b6b9fe851b4608a3976300fa1
SHA25604e2e567dc1f540c4cc5cfa797ddaa1dfc0cbd73c10a4801d58d88cd41e69327
SHA51218f2d06e48ee2d19d800a87a791233ead0d0573391f1914782d7f984d6c192f22ac904f73082cc60b938b7e1ff9d0f9471bbcea1c8526e5cc05c254ff4c1e6e2
-
Filesize
5KB
MD5570e3955d897f1c97cde7430f8252830
SHA12361e984a4dc173becc3c18935d1f6bd0bd4cd15
SHA2563bfd57d2226b48c130086d74313eebe2603f03e4dc0e6106592e378d9f0f22eb
SHA512dc41c68a9e6029e39b924f822e00ea368d5e07a8fef6a02b5ed1d054d365127d6a92d9d4ec395b35035095c9d691eb0c188dbb4772168000ad3f76b8f50a9a59
-
Filesize
7KB
MD5ce127ba8a8861485d7cdb23f339a040f
SHA1689c43b6e156e58095212b54fdede4de37b0aecb
SHA256fb9f1340a7dfbbf3337ef2269c3b13bfa25c478c48d199bffa389ab7f1335d06
SHA5127021a1f96828d6249878ca4b00c8aa03351cef2786831bba4f6664f8d3891f672d57b69ed70688c52770be99ea9cfbcd45b487b09a886c2e655ab155e08005a1
-
Filesize
7KB
MD5f0e2b4bf6479c4f9d735504cfa16aea5
SHA16bc5fe7ac18b7d2d3bfb886e790c80b5ce91cded
SHA256e4afd066ef149869f205993e4b383d7fbaf95edf0592689ac440e596f357da19
SHA51218161691db877ad5862294576a44a9803dd23e5a10cfe6fa0079b202b210b330b9de32b0cb9fc12ec2c0d1923dacf0c425f18719373a3fadc01388282bc8f260
-
Filesize
24KB
MD5d555d038867542dfb2fb0575a0d3174e
SHA11a5868d6df0b5de26cf3fc7310b628ce0a3726f0
SHA256044cac379dddf0c21b8e7ee4079d21c67e28795d14e678dbf3e35900f25a1e2e
SHA512d8220966fe6c3ae4499bc95ab3aead087a3dd915853320648849d2fc123a4acd157b7dba64af0108802522575a822651ecc005523c731423d9131ee679c2712f
-
Filesize
2KB
MD57060c93e9a4a1d7d6857ddc323347a3c
SHA1a2ddafe6dbba5cce7e5b1655a222c44638d4bb80
SHA256899e7c57b823aea1da5c7f4a6d4f0f3afb34a819ef3a95a1e70d3408b2dbe2c3
SHA51238cc1a284db25b148b36ecabd5a5b486b97148380187fdb32432e989d442546909a4f5ef89eabdfc84c7ae3109ed4f995727a057678cf382d5ef97719eb60690
-
Filesize
2KB
MD5082330b426f1a1262d11e18f17e3816a
SHA1068151cff509717a6c2f6d1b4abb8d45c98fe89f
SHA256cad2602dee71345df5dfdb6717adbfac8d2fcb8f83e5a34318192a60e0625d0a
SHA5128b49ea9d2d8e5d3e80393012e0024bd9a67b8150f73bd0186d13d97baaea76deeacf4ed233d9da7a5d5ad422c10da853fd88fb47df029ea0842bd7e7e7c8e22e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52f59d5601e1a3dae8ea06bb9b931522d
SHA18296c9e6405370e5f4a29c213154d64d0e08930b
SHA25663df15930bdb607d3698ae1da1d8703b4cb4377da9114bf968496909eacb1637
SHA51214bfd0d3538b4bf3057be1c18ce1c3414a141c92579f51550816cff2a18493ef90befc71497c828477c55168014daee0e826b87d878b2cc56875ef993c030b19