Analysis
-
max time kernel
23s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 15:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.tryinteract.com/share/quiz/6682adcc4f2f8d0015f25dce
Resource
win10v2004-20240611-en
General
-
Target
https://www.tryinteract.com/share/quiz/6682adcc4f2f8d0015f25dce
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3228 msedge.exe 3228 msedge.exe 100 msedge.exe 100 msedge.exe 3220 identity_helper.exe 3220 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 100 wrote to memory of 528 100 msedge.exe 83 PID 100 wrote to memory of 528 100 msedge.exe 83 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 4456 100 msedge.exe 84 PID 100 wrote to memory of 3228 100 msedge.exe 85 PID 100 wrote to memory of 3228 100 msedge.exe 85 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86 PID 100 wrote to memory of 3932 100 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.tryinteract.com/share/quiz/6682adcc4f2f8d0015f25dce1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb60b546f8,0x7ffb60b54708,0x7ffb60b547182⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11133339976138862489,1895572697637419671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
6KB
MD5b1194d294ea3740f3b3e6ecde590c750
SHA14c20e26c7869308ae8e75a9e2878064a3c14b69c
SHA2569dce4688b9aace70d14e31ad42d58581b8e8a69d2ad22c165dda0a87e91b1219
SHA512c6e16b4dd9d4c38ec6137744de1c62362438398d6516c5bcb0ac045854721ed99c2819db079ed30e989d5073bf537faaf661c11750e5ab74fa6e88542f94dad5
-
Filesize
5KB
MD5217333cfcb6f46aa647baf55b25263ab
SHA172a517db6a21e268c6b879f675afdb02f300450f
SHA2568681002ce3c64c407770e180e92325363c437312f3b6c5abe58597ce5d9defcd
SHA51298aa5a9002d3ec7439853303eb6345e5b80c09307ab6024dd67aecf04b274b205be1ca168caccd6f3e3b2646253f8afd6f3745af5475dfc1b3a697a212935fe3
-
Filesize
7KB
MD57ad928c4c5b72f5862fa86f3a700d1e4
SHA1cc95c53087bfa3ed049d323f8f6c59405fc524a4
SHA2560084ee0ced322a719c74be79e8cf6d9e89fad35adeb89df1b3d73e9d5bef8579
SHA512067685ce6a327c1de2f1ee0026db3d3ac883c1c0c41efffaf289ced23ff7484c8b828c6e65fb1e496e608cd9543c328bc4230113a0471ad31eed0a37cda6ea01
-
Filesize
706B
MD5366903b65be16a52c171f801f300917c
SHA1ccc37eaf29a4176b945829c32a95e1a0c66d8d19
SHA2560713cfbd86ec599069817950d49bc8100aafaabed5d55be3ead46233b24ec901
SHA5128fffc71f6ddabba4d448d30e8057ce61fc2ea86a6bb1bd697e0f28d04e4887fab80f9ae2c4c05ce7d3e981acaf427b8c85bbc7c40b437d613c1cea31dd0b3319
-
Filesize
538B
MD5d6bdff3a0f9523166ae2b773ed2dae4e
SHA154981de2442906524cf7d9283af2e20d8c7eb3d7
SHA256859240a8b2ca2719bdfa61213a02cf2ff5be70c790103524d9ccf95d1f7ebbaa
SHA512cc8b8a24783159d249777c409f26a77685d9964078e7573e6e83ec1e68688947d4cf4eb967f45c38ecd12f5f8a831cc940565915b5d918577d72999291aa8ef4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d47eb9796e8d67ea2a8bc4ed83115975
SHA127916b2728ea2f00b0c1c85d594a144abdf567e8
SHA256bf96c4645fd41208c1454daa8988249ca01a7b5dc4afcde36988b584fffdaef4
SHA512d43ace7082cc3115c5daeb24792eec49b39d2371fc0c2b35ca92ee8489b1566fab595b95f6b07fda6a6ed8f71e395a13baaa636e7afe68847ff024e0b3119c29