Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 02:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://reviewinfo-tax1.com/mytax/MYGOV-ATO/
Resource
win10v2004-20230831-en
Behavioral task
behavioral2
Sample
https://reviewinfo-tax1.com/mytax/MYGOV-ATO/
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral3
Sample
https://reviewinfo-tax1.com/mytax/MYGOV-ATO/
Resource
android-x64-20230831-en
Behavioral task
behavioral4
Sample
https://reviewinfo-tax1.com/mytax/MYGOV-ATO/
Resource
android-x64-arm64-20230831-en
General
-
Target
https://reviewinfo-tax1.com/mytax/MYGOV-ATO/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1228 msedge.exe 1228 msedge.exe 1584 msedge.exe 1584 msedge.exe 1984 identity_helper.exe 1984 identity_helper.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe 1584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1584 wrote to memory of 3328 1584 msedge.exe 38 PID 1584 wrote to memory of 3328 1584 msedge.exe 38 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 2148 1584 msedge.exe 84 PID 1584 wrote to memory of 1228 1584 msedge.exe 85 PID 1584 wrote to memory of 1228 1584 msedge.exe 85 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86 PID 1584 wrote to memory of 4996 1584 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://reviewinfo-tax1.com/mytax/MYGOV-ATO/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb39246f8,0x7fffb3924708,0x7fffb39247182⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3000 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,15130108436999211918,6272452188859073207,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d686809520430031d6ecf2c8de5f735
SHA164e3932e857e1b34077e1b7793f40ad35abaf6b8
SHA256c5f61a0a6d91e818e9ada3e527de4a5975767d6425823b33ea107cec0c99874b
SHA5128a5adfc8d90f0752672879cf18f55be8e80e36e2a7bdf281ee3967f9953413dc31c33a0b52ada169c3f628896a28caba1769d8d33874903260ad6c8d5a925e36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5d9f65417d094fd1f73d8c6ca0d4856d7
SHA10b34951aea5358f85b7bd353f58104b37923cb3f
SHA256bf4ddf070643003f603a6054a697c5b510d8729815a8908b1dadaec8c1cca5b3
SHA512db8bf8dd77000d333f6ccaa4631dda6e8e314ff3b4e1aabcfde07a46c649e90e50c5ba19f6b5226f07d7f59b1fbe1c81967e82b691e719b5b430dd794433a502
-
Filesize
871B
MD577ecfceb82a4c03910ae7c78951b6dad
SHA10d9d9d2e9ddbab71d48407ee61bcc49e98ccbb6e
SHA25656716a61682398f0e5e78e32fd937e047be1cc450a8ad52953fdd55a94d4ef3f
SHA512bfc86e6d7c9ccefe041cf89d5ac1c5cf826a83df0b2beba1eb558765e8cfe4b24f5688bee27b6321182568022f889eccad87ca78137390b047086ff5f34e0991
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5eafb736384ad90648ca51448c57b22e5
SHA1a45eafa50f99c81532892e379496b88346c0b52c
SHA2568423e481c62045d9d7f2e74972c1e21c9663ac05182913a6f34be6c71f087a95
SHA512a2f19e371f4507add67b6a14952efed62435bb4de75c80c0b8e160d1662d328cae468573b455493681d609c8bb208d104398279d5df1a12baabd240b27f0b3d0
-
Filesize
5KB
MD58ee27088b8833827ec87c310efb7eee3
SHA18f9556daee9da28d42014bc00f12cf44c6969d92
SHA2569df9efb15aba4ddd75f9853718654ae62dc1d9fe6d845b4385414f1738bcbade
SHA512f81a497f70649414302b75e665996e6156b5714e5ab628edd5957c2e15cb0ce9523f13fcaf958a0c235bbd6e3ed30acb8c4d0707c7376095feac7ea65e4db21f
-
Filesize
24KB
MD50ea195b890a87594deb9c6aa963c1426
SHA14065f3fe0b70940a968f2ca342bac336be048082
SHA256c51961b927f80537702a7ff5f77501c1e088cbfcc22199675400ea88876f4ef9
SHA51259ae3e1e530b5c081089ee615fb5d227a1964068bcda421de1319e958438353bbed8ca275897deb097a564a6a60400e1faf6c3e1aa5764d1fbba15bdc1d9ddf5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51366b9b24bd03ce694209bce918a1924
SHA1e87deec926229aa6eca7b3aafa2d44d14174479c
SHA2562724bc9f228f8c5566407258327feb0b4894776a451f8945ab05c4646bd397fd
SHA5124b9b20319663938a9e54096e844bc5da01228ed121501d167ad3aa088d7a95441c7723230aad20d10ae760569f7bfc8815fda10099afbd895b4129b28ef1d4d4