Analysis
-
max time kernel
50s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 14:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://utsa.az1.qualtrics.com/jfe/form/SV_8BOBIuBYyvEHkdE?Q_DL=Q9s8lPvlCt84aei_8BOBIuBYyvEHkdE_CGC_DmWIb1XbPD6alSZ&Q_CHL=email
Resource
win10v2004-20240611-en
General
-
Target
https://utsa.az1.qualtrics.com/jfe/form/SV_8BOBIuBYyvEHkdE?Q_DL=Q9s8lPvlCt84aei_8BOBIuBYyvEHkdE_CGC_DmWIb1XbPD6alSZ&Q_CHL=email
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-200405930-3877336739-3533750831-1000\{62D121FF-81E1-4988-8CA5-8055BC106DC6} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 8 msedge.exe 8 msedge.exe 2804 identity_helper.exe 2804 identity_helper.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 3524 8 msedge.exe 82 PID 8 wrote to memory of 3524 8 msedge.exe 82 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4324 8 msedge.exe 83 PID 8 wrote to memory of 4252 8 msedge.exe 84 PID 8 wrote to memory of 4252 8 msedge.exe 84 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85 PID 8 wrote to memory of 908 8 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://utsa.az1.qualtrics.com/jfe/form/SV_8BOBIuBYyvEHkdE?Q_DL=Q9s8lPvlCt84aei_8BOBIuBYyvEHkdE_CGC_DmWIb1XbPD6alSZ&Q_CHL=email1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc482146f8,0x7ffc48214708,0x7ffc482147182⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2876 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=2344 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,5000099819616581525,17689310199389166179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1948
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x3241⤵PID:1460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD517de40fb0c9c529d72c4cad6b6bc2966
SHA14e60fdb40de39497f4dbe378f06126e66ca66d58
SHA256693f9a2571c00012b446eba9d36f7e7ecbf1d0589e8e23e40e7e39d959cf8b0d
SHA512cf946913ffc75f3ad50dad5b07fad7d1cb10b97917e9a280083ff4fb7800bb45fa6c735f4c6169d817897f7ebbe14e80e522a7aa005b4607083a3037fc97d3a1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD56c6fea1eb488a74b292a3ed4a38b274b
SHA1ced14d08fb6c658c35259172765355fcaa3de4c8
SHA256778139896a7b8391fb87f31264073cb76a6ee4c8b3a9eb2fbb0d52ff5df573d7
SHA512b48ad247a7d9dee9076960928fe7c7c95cc886529d9507f9d2f2b8f7b321e63ecb1a759e6c2ada9e22c2f28855598cbf0cfe923ecb1d83cca7f320abf713dadb
-
Filesize
6KB
MD5ee03a9c85ba3ff8804d41d6df37cbae8
SHA1d28fd11ea7ca0b6eecf14f665145c32fe9cadc1c
SHA2565f2348d5f705d68baac08e3821624888128041ec3e37b779469679ce3aa37e31
SHA512eac8eed725a29f95a3e6a660a6257f54de1c3d8c858ab73d3c6a0ea5ce1f929557e0b5ce266c4b1175dca1f1df7f54651ecf95e0ab8f639ecac6925b87fd9ecb
-
Filesize
203B
MD54a9e39f40c3fe4ad5fac87aceee166a2
SHA1077d787e169ff2205a8dbfc91cbda374a9be9757
SHA2560407729c11377aaa646d3bf55306e3d243f17bf43e002883dbc2e89e58664440
SHA512d11a3d66c1c4caf8c1cd7977d7cfc7a3ffde0b0a02ba0215f481b5b79d882dc4b9c675e20d8903f107b12d6857bbbae4ad11d8d6b32414bcd0f324d117857c72
-
Filesize
203B
MD57a3c1d1c2f8b020357fba26b60273b9f
SHA1ff0ffc164c97a2e8b96a7a8fce143d387e9169b8
SHA256e475704a0531c47d338c6a471418e7c472af26813a6cfc764342ed3981ae85e5
SHA51203e80304e9340ead6702505a1cde6b7df3c16758128757ce099b8b1e0f673e3cc26ece33a87001d0f77baaa0847a2046cb1238ecf8811de09c998a2a64fc8f01
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c5b6765e00047b6cc6df5d0fa855c596
SHA1df0fc9cf5f8381a5b92f5bbe8e055b37a5f4373d
SHA2567dae21661f2996365249dbf9af931dd43ef4fff0304cc0b95760c51b2d28bc0c
SHA5122acc84a7c290739b3c2daa4f246fed485a4f75aac19620548b8f1e744b21dc440e20f46543c5ac543f83d235e942491f7903801665d1d9bca2f8b3eec340b336