Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 17:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://forms.gle/WuVn2tLkxANsRnqq6
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://forms.gle/WuVn2tLkxANsRnqq6
Resource
win10v2004-20231215-en
General
-
Target
https://forms.gle/WuVn2tLkxANsRnqq6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 2452 msedge.exe 2452 msedge.exe 2568 identity_helper.exe 2568 identity_helper.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 5004 2452 msedge.exe 87 PID 2452 wrote to memory of 5004 2452 msedge.exe 87 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 556 2452 msedge.exe 89 PID 2452 wrote to memory of 1052 2452 msedge.exe 88 PID 2452 wrote to memory of 1052 2452 msedge.exe 88 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90 PID 2452 wrote to memory of 4024 2452 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://forms.gle/WuVn2tLkxANsRnqq61⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe176c46f8,0x7ffe176c4708,0x7ffe176c47182⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,5679923408197762672,9817696641387336211,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57a5862a0ca86c0a4e8e0b30261858e1f
SHA1ee490d28e155806d255e0f17be72509be750bf97
SHA25692b4c004a9ec97ccf7a19955926982bac099f3b438cd46063bb9bf5ac7814a4b
SHA5120089df12ed908b4925ba838e07128987afe1c9235097b62855122a03ca6d34d7c75fe4c30e68581c946b77252e7edf1dd66481e20c0a9cccd37e0a4fe4f0a6fe
-
Filesize
1KB
MD597e073cd5c2f6e8f920d8060091b7cb0
SHA18cd8f6f33f1450307c5f1ba89e425e443dc24856
SHA25680927cdb9ae77e7141c36114a29c46e691e90e07c8f304ffa4ce567f6539b97b
SHA512be4ca4b3c15d5ccd6163ce34f5c049d43b300b37f0ae6d26c4905b768dd1a72a70a919a793ad0674a22b7b7025c500bc949e5de9bf8da0e8aacf54ea0c7fb762
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5cd75833e839c7d52ce1e063c88163bc5
SHA11812c38ae6be0d1896e2b374abcd5aa8cec84f5a
SHA25653b5c1393f69549920c5d54b37226bc2847b4a476a29f6f361db94c8c61cdb18
SHA51286972de99081632827f961f4e452ffc2646ba303ed43074bb3394675d9e1eb5f443bf19fecbefb53f055c49eb3d3a21c0b1f0cdda6495088826add115bb367e9
-
Filesize
6KB
MD5e1a71021ecb7b61338ba0290f12f4c9e
SHA16d8678417df8c090eaae24034dd8f3d7accc898a
SHA25619de66ce38098b324d26722de0ca57d2986823ba63a040d4a0523da58bb94afd
SHA51249e23351aede681dd660e2fe9ef2309c859565d764b9380355785057d0fb3a8f5bb0cdc05cbfdc1e4de4cea4506ba6b6a42badfaca4053e2b91a6f3d119837b3
-
Filesize
24KB
MD552826cef6409f67b78148b75e442b5ea
SHA1a675db110aae767f5910511751cc3992cddcc393
SHA25698fc43994599573e7181c849e5865f23b4f05f85c1115dff53c58764d80373fb
SHA512f18df18cab6b5ecd71b79c81a2a1fdac42cc9960f62f06ac25f4d6487792705f2766ee3a10239eaac940d090186e6bc820e4eb7a5ee138f6e5c1c64f951b960c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD500de6b4ca3dd3cc7e5077dc548eb72eb
SHA1a7a100c72f5032c4571962c6338822cbf664e94d
SHA25616d1e82047685b387ebd555cb4a5cc275d712994bdf337a907bb4c122886f3a9
SHA5122d575c0a44d890f9a84e471315fcaa2f433bb73e5fdc0ee1fdeb76f3c1ab828600b08a12d1dcbf4e7d7a50416bdabe107b7e35ba5f8c1d72757c901fac84c473