Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 15:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://eu.surveymonkey.com/tr/v1/te/bMFhzt5LYRh9_2Frhc5ALGdrkizWIr1Z5UC4F3sr83l8hpT2H8kqe4CigIPTdn4pvAEztPyKdzbDMkdYLb5_2BCYL_2FmJjHebwxFqHSnyy0TwWDv57_2F0U8z_2BkGESGGWH68YRSYAjEJUNSCdkKK8PUZQI0AXYOep7FUD9abC_2FW5rXNvCHb8d1TKudrXkqG_2FZBl4Ei1DFpC7aDXCM_2BzoHqYxBfOKMjm47eqFLBz6FBOHtWjLXgdxWsFg5vIKMuC8XAMaCoo
Resource
win10v2004-20241007-en
General
-
Target
https://eu.surveymonkey.com/tr/v1/te/bMFhzt5LYRh9_2Frhc5ALGdrkizWIr1Z5UC4F3sr83l8hpT2H8kqe4CigIPTdn4pvAEztPyKdzbDMkdYLb5_2BCYL_2FmJjHebwxFqHSnyy0TwWDv57_2F0U8z_2BkGESGGWH68YRSYAjEJUNSCdkKK8PUZQI0AXYOep7FUD9abC_2FW5rXNvCHb8d1TKudrXkqG_2FZBl4Ei1DFpC7aDXCM_2BzoHqYxBfOKMjm47eqFLBz6FBOHtWjLXgdxWsFg5vIKMuC8XAMaCoo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1304 msedge.exe 1304 msedge.exe 4496 msedge.exe 4496 msedge.exe 3092 identity_helper.exe 3092 identity_helper.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 876 4496 msedge.exe 83 PID 4496 wrote to memory of 876 4496 msedge.exe 83 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 2888 4496 msedge.exe 84 PID 4496 wrote to memory of 1304 4496 msedge.exe 85 PID 4496 wrote to memory of 1304 4496 msedge.exe 85 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86 PID 4496 wrote to memory of 4672 4496 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://eu.surveymonkey.com/tr/v1/te/bMFhzt5LYRh9_2Frhc5ALGdrkizWIr1Z5UC4F3sr83l8hpT2H8kqe4CigIPTdn4pvAEztPyKdzbDMkdYLb5_2BCYL_2FmJjHebwxFqHSnyy0TwWDv57_2F0U8z_2BkGESGGWH68YRSYAjEJUNSCdkKK8PUZQI0AXYOep7FUD9abC_2FW5rXNvCHb8d1TKudrXkqG_2FZBl4Ei1DFpC7aDXCM_2BzoHqYxBfOKMjm47eqFLBz6FBOHtWjLXgdxWsFg5vIKMuC8XAMaCoo1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa58846f8,0x7fffa5884708,0x7fffa58847182⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,5010720529211791690,5780502848190662698,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD54678fc1aa26b3ff44c2603a25702a025
SHA1e61dc72de3ca89342c906c3974b8d0f3f6ffca39
SHA25661de33e9e8a3e53ab2273638ec69b0047fd1c753e05622e809d525a53722244e
SHA512f429b9dabe03143b1b2caf6275578e3d87e19035b3339721bd45624aab952d9eccaec7c78367d6d95c1743b381332f9149ab2ad1a78b5a3ebf0b42b1202e0f45
-
Filesize
616B
MD5e9c1ed00339a9c1f259b3683ea864509
SHA157157dee8ea6d177256dd12aa0f4e675502ada4f
SHA2560985303e2700f74cffa4ef5d4654fe47b07e39bff1b01ec1fcbecc91f861b349
SHA512add228386fa348df38611f162de31fdd46cb333d0c49d552f2a79c63d80335340e54936f565127127e58a00de6b293471da84b2b588838c121206816fc0a487a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD548d2295a977c17ff53c73dc83b8829be
SHA15556b760e5bccbae5cdef289cd82639c86e5352c
SHA256616b470db5bc03ad31dc55a51c4448090b115369d2cf2a44ba79001821e6d9b1
SHA51218560a665e71bb8090e7636a2ef74165ef7f58776143861098213262ff03aa947974b4200ed30275ac727a2b48a32dd480c09dec262ea9354f8ca39a89f43a9f
-
Filesize
5KB
MD53f5674051a68af3af22bd9a0d8ba1bf9
SHA102151be17321d6a89a80743f0411b4fdf223729d
SHA256594bd658dfded655ecbb9e9b736f153b978e4a3bd9b1121f70e2ecefce20a3a6
SHA5122b7cfe52836bf353cb9067730a2b1f1525721db3dcdc06d0580154fb8f5ec0fe66d348afa726cc4dfb203fdb426fd28382d5f6a1fa0f30361384d476663a74e3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD559ce61345c371b5a473e3aa6ae0e7671
SHA1fdcd3be918e3abd725ada187719bd15223530368
SHA256fb69f572568f10f6564db4fd35f9c63c1c02a15ed42a20458b27d65d6fda5020
SHA51257fe921bc0ef8a6d0e91998706cc8f26928c3f85bec6bc058bc8c41e6523a7c73e863f07e1dfbe65e8884165babac9f6e614e359e571eaf3112242895936e58f