Resubmissions
24-04-2024 19:59
240424-yqgajage79 724-04-2024 19:57
240424-yphrzage58 423-04-2024 04:09
240423-eq6ewacg91 723-04-2024 04:03
240423-emdwfscg34 722-04-2024 22:28
240422-2d5zxahc3s 416-04-2024 19:49
240416-yjyk8sah97 116-04-2024 19:48
240416-yjhj1sce5t 116-04-2024 19:42
240416-ye16kaag85 116-04-2024 19:33
240416-x92j5saf45 116-04-2024 19:16
240416-xy85vabg9w 7Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-04-2024 19:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://collegereaction.iad1.qualtrics.com/jfe/form/SV_eJcHY0KH1MQ9Xf0?Q_DL=flvRqjA1lFsyLtR_eJcHY0KH1MQ9Xf0_CGC_xAeoMSgITjc2138&Q_CHL=email
Resource
win11-20240412-en
General
-
Target
https://collegereaction.iad1.qualtrics.com/jfe/form/SV_eJcHY0KH1MQ9Xf0?Q_DL=flvRqjA1lFsyLtR_eJcHY0KH1MQ9Xf0_CGC_xAeoMSgITjc2138&Q_CHL=email
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid process 4852 msedge.exe 4852 msedge.exe 4608 msedge.exe 4608 msedge.exe 1396 msedge.exe 1396 msedge.exe 3056 identity_helper.exe 3056 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4608 wrote to memory of 1500 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1500 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 3224 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 4852 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 4852 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe PID 4608 wrote to memory of 1844 4608 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://collegereaction.iad1.qualtrics.com/jfe/form/SV_eJcHY0KH1MQ9Xf0?Q_DL=flvRqjA1lFsyLtR_eJcHY0KH1MQ9Xf0_CGC_xAeoMSgITjc2138&Q_CHL=email1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffac333cb8,0x7fffac333cc8,0x7fffac333cd82⤵PID:1500
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:3224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:5112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:2452
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:3328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15449543517239224968,12910154138893125403,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50fcda4fac8ec713700f95299a89bc126
SHA1576a818957f882dc0b892a29da15c4bb71b93455
SHA256f7a257742d3a6e6edd16ac8c4c4696d4bdf653041868329461444a0973e71430
SHA512ab350ca508c412ff860f82d25ac7492afb3baf4a2827249ebc7ec9632ee444f8f0716389f0623afc0756f395cf00d7a90a0f89b360acdf72b1befe34eecb5986
-
Filesize
152B
MD521986fa2280bae3957498a58adf62fc2
SHA1d01ad69975b7dc46eba6806783450f987fa2b48d
SHA256c91d76b0f27ccea28c4f5f872dee6a98f2d37424ef0b5f188af8c6757090cbb5
SHA512ae9ba1abe7def7f6924d486a58427f04a02af7dd82aa3a36c1ed527a23ec7897f00b0e30f22529e9599ae2db88e8abc7ba8013b426885aa3c961ee74678455f1
-
Filesize
201KB
MD5f5bc40498b73af1cc23f51ea60130601
SHA144de2c184cf4e0a2b9106756fc860df9ed584666
SHA256c11b6273f0c5f039dfef3bf5d8efe45a2ecf65966e89eeb1a6c2277d712ae9fb
SHA5129c993ef3ec746cbe937bbe32735410257f94ceb6f734d75e401fb78dc2e3ab3b7d83c086086f0e1230dc8dafd5328f9af664341eb781c72e67c4d84d1f6c1112
-
Filesize
6KB
MD59004e49e306428e725f5a9b2e6373ab4
SHA1c6c44b775900d3d8fac59960fea58700b75e2fa7
SHA25606b1b9e3c5683ac00efacc06df273ae010741695267d972f8740cb62ae057caf
SHA512084a61de8c30283c571f1a05a048b33edf80e8d56168ba7f8c69e75377e96a791fb27898bf805acf42d5ec78da8e21d68454cac9e69e65717264a06b6a922343
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e654f7f6-3cc5-4d2a-9c78-f7e5d786b9d9.tmp
Filesize5KB
MD5629d7cc5e526e7ec9c244238d2ef0fcd
SHA157c6b50ca7681f1c5dd3e6882bb35304b67bcba9
SHA256ff719ccd87ed71c74fc574e47ff5ef0ca4d7b81696df0a16fad908f8cdabe6ac
SHA5128929f6ebcf634ace863be9cc740d333483464fa6b8b59982ce89801f33a688d25f909d29fadecca128a2123f2184ae0c3d28c702f68502d64b521f4889b96c65
-
Filesize
11KB
MD50ab29f197957b77052268982e1bb3a27
SHA10510e612ab2917137068c28de39d8238960f945c
SHA256f8fea7bc9783ab7a4024e208dcc3ba7c1d17febbb32c0699f9b8616de648a262
SHA51223cc0f0eb229f00624d9b59f16e9c8b61a7eac4a8b9800d27c461851374de5623a2ab80416aded1a7c23b2a31b299c372e16c16a723405804aa322b8e39343a2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e