Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 10:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/forms/d/1o1J-9nWzT9cEDwyA6KjbFM3tEmewmQ7egU_VmPWEKQY/edit?usp=drivesdk
Resource
win10v2004-20230915-en
General
-
Target
https://docs.google.com/forms/d/1o1J-9nWzT9cEDwyA6KjbFM3tEmewmQ7egU_VmPWEKQY/edit?usp=drivesdk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 400 msedge.exe 400 msedge.exe 468 identity_helper.exe 468 identity_helper.exe 5864 msedge.exe 5864 msedge.exe 5864 msedge.exe 5864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 400 wrote to memory of 2444 400 msedge.exe 55 PID 400 wrote to memory of 2444 400 msedge.exe 55 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1232 400 msedge.exe 86 PID 400 wrote to memory of 1552 400 msedge.exe 87 PID 400 wrote to memory of 1552 400 msedge.exe 87 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88 PID 400 wrote to memory of 2560 400 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://docs.google.com/forms/d/1o1J-9nWzT9cEDwyA6KjbFM3tEmewmQ7egU_VmPWEKQY/edit?usp=drivesdk1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca58946f8,0x7ffca5894708,0x7ffca58947182⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2300 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,14121646894492614519,16342379770703754474,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5a321092f14bbdf803528678f66181839
SHA10008175b939a39a2835fca219228c4d169796b9b
SHA256e897037c80cf8fbbfe81e74982a2b9ae1df8f92aeb0a86adc9b43564465e5a2a
SHA512bef5ea646012ceded9c293e8b37b197017c0c8b99798be44c95e87bcbd9b3dff6e9f2a3c82129849614f7a677ae818a3cccff8cc7232e72c18ee00aa292e0b40
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5e372932548d4da5cf7669ddd13006982
SHA12382c36a9e670007c9dec05d1781fdba146bc8dd
SHA2566a57ad834f7a4b470edb578befd133e96586452a62239335005cd0ef69a9b77c
SHA51253652ad5039550d4b789021675657eb4cda7c33c37a2c8ccc2aa2b11e2b70ed1a06a7b157fe1cfa5b26b4c42ac1f61826e42b2194a97bf1f34dc10b0e3255ceb
-
Filesize
5KB
MD57496dc28cbb225719d7d25d70fd8c5f3
SHA18412b82ed93df1027235f1ccfd022711142ba368
SHA256e595437abed1c46bbc5993a24bea04d634a8e251dbf8a220beaa94067b18e382
SHA512990904d3a893080454e1594d379764a06eae3b37c693c12b4165e7a0cc0101af73137d52a1a7b143e2c6a2a6579474bb79c4efcacddbcf5abd489ad53641bbe9
-
Filesize
5KB
MD5f663e8442e85e8acb86fe4b60f70a02c
SHA16c5954675b15567395a9a9c3120f66ee345c129b
SHA25664efa77b13be3792874aec406d52ca647377073a12931febc7687d081d67fd73
SHA51283f424a488333a56a476a03f13c9f7879ff76e0b05b4376407dae8fdf2e345851e584e46dd3a92c6af7b0bf8d0bfdcf2d59823b65b8b96efbbf1291f4d814990
-
Filesize
5KB
MD51e0dd7cdd6c68f7ab8c33dba90b1f933
SHA11f2bbb212f27ba9d16f2050a18434b933412bf94
SHA25687ee3ce26c8a1eb64d348fa214f1af369ca2f6f4bf1b0c227a5d67cfde1e221e
SHA512a4c7fed365fe2083284ede3c009d306847058b4723247005ed7d9686563e81d13adb805e0fae29aa47a5dcaf292d93b4dc4b356463885acd16bdf2d8656c8cb0
-
Filesize
24KB
MD5699e3636ed7444d9b47772e4446ccfc1
SHA1db0459ca6ceeea2e87e0023a6b7ee06aeed6fded
SHA2569205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a
SHA512d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ea921b53-3d46-4c82-b133-74c43d6ae573.tmp
Filesize5KB
MD5391688e6c9b941f2d3ea555f7d4aa3fc
SHA18867aeda8765657d2bd9fa226d80f09b72b52d0a
SHA25619ba3128ba5fe290eb3630513a134c7c67bb991ac132a74a6489bc9ad3a697f6
SHA512e6d69d18ef05f3e9ff6855f6e1f8bb89cdcd96c4a294fb660d7bb2e8be2432fb39b185542ccfab73f8a19aa726784dbbe8c1422dd3d33da19c8faac21d182c81
-
Filesize
10KB
MD5c5bd5b62165a52089c6fca47ba41132c
SHA1d6f450e3943027103019f6d12d6330f428667096
SHA25637f250499838a8d668ed9f595e9bbc68547037f53fb55727b269991803c14ca1
SHA51201912b825c003ad7f3bd46f2ebb11d54287ddd0d23d2bf0dce9a29fe0cbb406560c802abb4daf00773e5ae51b4698b82b049dd159f018f6a5d8f80c44c84725b