Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 19:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://utravel.utah.edu/?_gl=1*14crnyt*_ga*MTM4MzU2MjQyNC4xNzAzMDg2NjE4*_ga_5XYQWYM4Z9*MTcxMTM5NDcxMS4xLjAuMTcxMTM5NDcxMS4wLjAuMA..
Resource
win10v2004-20240226-en
General
-
Target
https://utravel.utah.edu/?_gl=1*14crnyt*_ga*MTM4MzU2MjQyNC4xNzAzMDg2NjE4*_ga_5XYQWYM4Z9*MTcxMTM5NDcxMS4xLjAuMTcxMTM5NDcxMS4wLjAuMA..
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 2752 msedge.exe 2752 msedge.exe 2744 identity_helper.exe 2744 identity_helper.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 1688 2752 msedge.exe 89 PID 2752 wrote to memory of 1688 2752 msedge.exe 89 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 4888 2752 msedge.exe 90 PID 2752 wrote to memory of 3192 2752 msedge.exe 91 PID 2752 wrote to memory of 3192 2752 msedge.exe 91 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92 PID 2752 wrote to memory of 2728 2752 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://utravel.utah.edu/?_gl=1*14crnyt*_ga*MTM4MzU2MjQyNC4xNzAzMDg2NjE4*_ga_5XYQWYM4Z9*MTcxMTM5NDcxMS4xLjAuMTcxMTM5NDcxMS4wLjAuMA..1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe849146f8,0x7ffe84914708,0x7ffe849147182⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,12529348753475749163,17142483409034330438,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD549c55279f39a07052c2bf5783b067ae0
SHA1c0ccbd5f836e4d425c87e2a785faa05bf409bdd2
SHA2561c084c7be559d8ec322279e112483391d2f024991b1d7ee26413b2988757d1d7
SHA5125512d8a1bcad5f579b0097c48b7a462e40a7ce4b76ccf5fbd97d689aa147cad7b6bf38368ccb4686508cd42f40dc60828aa34137e26e7e1e8d687c8666d39b0f
-
Filesize
808B
MD57d74fc7de48ef8055673b77cf738f849
SHA1c3676b645668c34956049293b2f6d214b72e2ba1
SHA256a184004725b23147aa5ae238e386c8893c14c94160a744b83b0c33eb18f2634b
SHA51292f33d46602ba74732896f85e2658c0ea7b0c8859db15067917aebf5a218ccdb8d4f3cb875875a2a3147e44cd1fca57c7781c4ec6b9edb9ae4480f4f85654d53
-
Filesize
6KB
MD5e6a0e870691abffc1d066ec33aa9ac2c
SHA14e909a845754e2b2255d9f7c4e21955757eae336
SHA2569d05f3b58bc1fb48285434c46e044a3ca7d5ee0642d140740e9c251079e0d7d5
SHA51292b3210cf16ccb97eeb7be466bd22a55d7a92f39310832d48539b06e94d116c52ea64e3c0500e2769282038f3def4a2d5b2dead4d532f2e0bcfe7b59d6899771
-
Filesize
6KB
MD5844d4c863496530ce8ae20db110ec5c5
SHA18025779521e878c3df87d578078127f37f4a49f1
SHA256f9281c0b784bfe9112bd61abd7e41eef21c36e9d66f5d479a1213cbb50c52d5f
SHA5123ae528c0b461a7f8298e2839d7b0e181a68f221d07aaa1079be74fd07a4eebc07ac4a3d3da4b0fef7004ba870bc93bf9a6a150963b4e46ce8b01baf6b665e234
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51617ab0a1dcc17af851a97cd3ba7183d
SHA141b76ced00c475f4626fca6ed36afa0d043e32b8
SHA2565288fa526b861877936e6c99bb25343d73ae3705feb019c83fd0e2beb6c98a9d
SHA512071cbd03b93a4fc071a96202f571fd1bef8150b91579e685de02636908b62c961ea98eafff05ef365902cf9c6410c4f475dae58c589a7c7dacc04ad769f7a16f