Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 21:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://form.asana.com/?k=SVzOAgf254NWBNm-dO6Wfg&d=1208255323046871
Resource
win10v2004-20241007-en
General
-
Target
https://form.asana.com/?k=SVzOAgf254NWBNm-dO6Wfg&d=1208255323046871
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 1532 msedge.exe 1532 msedge.exe 4332 identity_helper.exe 4332 identity_helper.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1532 wrote to memory of 4936 1532 msedge.exe 83 PID 1532 wrote to memory of 4936 1532 msedge.exe 83 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 3192 1532 msedge.exe 84 PID 1532 wrote to memory of 4980 1532 msedge.exe 85 PID 1532 wrote to memory of 4980 1532 msedge.exe 85 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86 PID 1532 wrote to memory of 4292 1532 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://form.asana.com/?k=SVzOAgf254NWBNm-dO6Wfg&d=12082553230468711⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb42b946f8,0x7ffb42b94708,0x7ffb42b947182⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5225667691814994550,7084560852591558418,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5661df5e045b9995b0ed99f2980087572
SHA196ec4eeeb29e003ea64878fa8702660605042ec6
SHA256595c1b81d956a2529d7cec22950e0098cdeb8ee3f4d0eec8ca885c8f147b8ee7
SHA512952c8d8005a52e35bd0db9b1f48bc023c945a9e192edfd1e9548fc0d59ec51b538be191083023110ed1feec0c6bdb183a2bb47022dfe4bb424a8004abcfe1ae7
-
Filesize
1KB
MD5ae8e9eb158a2519a2a934afa5e51fb2b
SHA183482b286e8459c3ebcfcd0146e59491cc3a5d80
SHA25672906204811f91a507abf1f1549dd66d7a27091a7c4ccbf3a181212a6b308641
SHA5127a97c4f5d9eb14ab743c34ccff81df375e3898ed5582f26b42cbdecc0c1047e9b5f47949f76184877cbf1c744edd1cb6cad532950dbac3f77220e5aa49f3c268
-
Filesize
6KB
MD5789b24769c3ce05d8f40e12308daea59
SHA12fdc96a43c04c968a9ad52a3cc1fc474b05727d2
SHA256a6a96a5143fb06c24b02428e4522c00955aeae21fa26f0ce0707a5fddd2550a8
SHA512d8386232e67a20e5180f81455b18b95fab6767052c422338ac7fd72ba03567aee5ca99dd3c0f7ca00b458984a8b7cd5f3943e78e7587825294767ef588154f98
-
Filesize
6KB
MD5ebe944eccec749ef53ffe2e104fd682a
SHA157b67cb37090cb83b0fd1dbc3a9bbbfde3bf630b
SHA256ecce34e536d85af72fb9633db343d15e034851cb07232906cd7e3313e351fabf
SHA51219da50ed134a170f988a1ef2696084164d6e69019e9306e18068941146908b481791766280358c60e69c0396cfee00293d0d9db3e33932ceec9f6cc42b5cc4e3
-
Filesize
537B
MD5348eb8d35b6fa0e60509fcdb9a40cd8e
SHA185dab79496f870a396e896f5b9091808090575a8
SHA256c9f11dbe018a82ec23b72c780a4f7db8be2d5e227935a4a079faa4f9961c4faa
SHA5120865006a5a4b28a82fcfa380f09eb71c884d8f26abbdb5711e0a38f9e1757fd7c724eba776e56b09e32410ad473838e9807970d9410fff3b8178e2fc231f47bf
-
Filesize
370B
MD5f96c2d35bdc77ea007aa88330ef935d1
SHA1079eb75ba30ed216ab33868fcdfc4ee0fbd2e02c
SHA2563c139b8bc1e5a0c419705e119ebfb24b1fb479df4912993ffa32f3eb1ff21c6a
SHA5125f579d805136b281ff23baea7cac1c3d911c34ee7335b3d61ecfa97a42d6063be48b52fad7d57d4f8ba926db21fb130f1f9b2b51aae705d9fd9adb932889a3fe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\db37bcc6-9ebd-4254-b838-57a855930098.tmp
Filesize1KB
MD51ebe3f032aacf8265201606cae36c1ff
SHA1b61a7f247004ca052c19f600eb1a3bc03fc6b875
SHA2560e4bfc978f76b44e5635cc169521fca755e1a588a137adb6c270e502162b2e77
SHA51220049d8d8f04cc039debc2583ceabbae8a11f33a948fe66d3a25c60e9f63a399f7cf4c4a5ed56f599854780bd25194d96e136a067c8e2b8e6336b29380a60ef6
-
Filesize
10KB
MD569b68cd803f67a2d10348f251273c1e3
SHA11dd996fa9f13306308c709a702541d4d2a85c120
SHA256b43ea72c52ace0f389deb9eb60e54ad470a3fbd5229e8b8835e11d3f1d5ecd8d
SHA512a8931721f9b886b2f5098c91c4caf5a17c0b5c67757c6352cf0fbda5c9e9512fd35f45c7c9a2ddcc5de62c3ac9f052b8bb6630668afb05264f6c6e5e3984d36a