Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 01:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://aus-income-office.info/supportdesk
Resource
win10v2004-20230703-en
Behavioral task
behavioral2
Sample
https://aus-income-office.info/supportdesk
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral3
Sample
https://aus-income-office.info/supportdesk
Resource
android-x64-20230824-en
Behavioral task
behavioral4
Sample
https://aus-income-office.info/supportdesk
Resource
android-x64-arm64-20230824-en
General
-
Target
https://aus-income-office.info/supportdesk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2200 msedge.exe 2200 msedge.exe 460 msedge.exe 460 msedge.exe 1160 identity_helper.exe 1160 identity_helper.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe 460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 460 wrote to memory of 1260 460 msedge.exe 81 PID 460 wrote to memory of 1260 460 msedge.exe 81 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 3752 460 msedge.exe 82 PID 460 wrote to memory of 2200 460 msedge.exe 83 PID 460 wrote to memory of 2200 460 msedge.exe 83 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84 PID 460 wrote to memory of 708 460 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://aus-income-office.info/supportdesk1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd54b446f8,0x7ffd54b44708,0x7ffd54b447182⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13545789755861168658,545139102964387851,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a7ad9bb1054aa03e39b3554833d0c3ec
SHA1cbd5b99ca100bc2f1292df23bf8e2a5a6f9640d9
SHA2560c3eae39386b4117ad26187afc4933e254468cd12d813271f4b7420cee73c189
SHA512d1d0b77e0bc412b4ee687e849531a7c9b70200d45d0bdbf38357b6fc59af835522e749b2fd8c2d4cde73518970568c38d73416c97381a11cc6029c14b1678276
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD57b907273d5f1b7ee6c5d9deed71f2f75
SHA1efff616ef1dcad687e797d2bde7296f25bd3349a
SHA256008ec548fa4b8d1cbaaa38d833e123cd65e79af84408b79660961fecad4b8645
SHA512e5f1ee7dff5f8517575c9eddee2ec576ccdd21df01a92353516ed524f4d10e8068fb8b7e5b8c84be4f35d66ab14982d9f91284080f8755986c1519db7c535fd8
-
Filesize
875B
MD5049e2a4b7155bb9f1eccb03512fdcc6c
SHA1e889e09ae09958b4c9857ec570d9ff0c8f97c88d
SHA256432761f9efa5e5514829c82b84eccf0bacb0f219aa31667c82339bf4eeb89c17
SHA5120397310bfe16665bb88491a39d4da3c6d0ec17cf6902418a8c3f7f911dc20f9641d2647a8a0804f481314f406e0c85b904afec9d1da89925d5571f0733d4ae7c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5371b99cf7b65f998d1d38126cddac425
SHA108811f3fc50fbc3427a126ce34e0d21ac4338f38
SHA256f68f4d6cf3dab13cda8a304106937a7ddb3d968a1cdbeb26bb2ccede41231869
SHA5128317e55a7d48d9ddc0ff2028c0997e87a6cd050d60c5d219e94127ea3f674d9d663071197adab4c87221ff6eba86d6a55de375bd9eefbaca1fc8cb17b3c3c413
-
Filesize
5KB
MD59b5c1fea4a2190596113cff35a70e5e4
SHA1218b6d47f7f88886624b3c16098f50a444fad6ce
SHA2563ff87def60c0eccfb475429d1b85ecb206538b3b1df7cfd5134d2883268aa277
SHA5126ad486d365771b49798201713fd4b5f0a2b776a0fd5908d3a2db6537a308d1ca5538bf7d6e81de14a8447d3a439993dc9d1a4e942d61aaa8e42584209dec920a
-
Filesize
24KB
MD5e62cc4051e1f8eaa0abda5d730a2496b
SHA1d15346e40b196bc313cbfe5ac96b3c90b83345be
SHA256ffb5b740b8777d010f0d32a120092084c3cd32eaceb937188d698ddc22df2fcb
SHA5123e8f6d89c7c153177b2149d86cd8602ceafedf66f5335a86b19dfa46fc38c47f6ff9a272c3b71b4464a5921ebdf2461fba25692ca916b9715bac520bf1e81a22
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5598b62a275c42787185acc971476df37
SHA14b35e6054cd006547a3ef3a39bacbf2bb2480d33
SHA2565722aec4695b62e28dc83479bdc533fe224b3de41e5d13fad64aed5a463b4a80
SHA512764bdc59d5fb55c12feb1d438b36f1a8ff18f7cb832dda78b5e8fa02c1447e90dd5f4a272b42fef4d49146af591ce6c26ad300df5fd397709dfa77952f183e88