Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2023, 05:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://login.bragayot.one/las/mygov-login?execution=e1s1
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
https://login.bragayot.one/las/mygov-login?execution=e1s1
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral3
Sample
https://login.bragayot.one/las/mygov-login?execution=e1s1
Resource
android-x64-20230831-en
Behavioral task
behavioral4
Sample
https://login.bragayot.one/las/mygov-login?execution=e1s1
Resource
android-x64-arm64-20230831-en
General
-
Target
https://login.bragayot.one/las/mygov-login?execution=e1s1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 484 msedge.exe 484 msedge.exe 3088 msedge.exe 3088 msedge.exe 4904 identity_helper.exe 4904 identity_helper.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe 484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 484 wrote to memory of 3488 484 msedge.exe 84 PID 484 wrote to memory of 3488 484 msedge.exe 84 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 4152 484 msedge.exe 85 PID 484 wrote to memory of 3088 484 msedge.exe 86 PID 484 wrote to memory of 3088 484 msedge.exe 86 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87 PID 484 wrote to memory of 2656 484 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://login.bragayot.one/las/mygov-login?execution=e1s11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd685d46f8,0x7ffd685d4708,0x7ffd685d47182⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11630879323982325032,14034706919035654955,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD53c7d7b0724bf14dde60720177f47e635
SHA1a24093535215c8860d209504639e36bdaa3a5891
SHA256a13ab0b06dd9729f6dfdb9a4e1948148d3cf2bad0dd76bbaddd5042d4b647b33
SHA512b74a3c9a7df949cba947cae3bf7f5f56bfd946548cf3c93eaf8123f1da6ec8840907e446b9dc80dbc0ec6cda881c30dd473a028e88dbe81be9afc3eddcfb4b8f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
476B
MD5d56d08c71b138626f99e798e40b9e508
SHA16e02ecbcb43747c1972b156d4ab643ea31e2229a
SHA25606c9f8e8bd093adf449ca85f2aee6f9f8a757b623e9d7ee0f6bd511f4eb7f25f
SHA512003841f2557648a35dbd761194a058f0bff0ce48152826e3ce0755fcf58344d3d66f4d3971c4202e3f28fce36c73bac9f62058c0dac0a3f35271f828eda2cabb
-
Filesize
6KB
MD573223101cdf1feae9b02445050fcbb17
SHA13bd2f01b358272a30c3ea3e19cb424b97077f0d1
SHA256aedfacc75df365be5a8a2640063cdde9f7c496d17005a9e65a869829fbf60e03
SHA5128f1a7a8abef8297d056a439205d0ba9c2a2c7878ac5dbcd44296f93f768338d412bce5db628a51d1acee97f2e1084762d53ab4cf8563f9df1c50f23467da60b9
-
Filesize
5KB
MD5ec78e36eddcf7ac076d373dae1e37f63
SHA124bb29b14ba890325ce8acc56af7ba50813a93cd
SHA256fb5cfabbf3e53b091d0567f00ec1ecec8dd86eea46fb57daa190e2d503415829
SHA512c6e2bc2536a9daec47c2a1901a4d2c94485887a2a6bde50a3c3e86b0c84d2e391fceb14ba2e3b036535432aa88322e9dad66548f155383ac259cb6fc353f4ce0
-
Filesize
24KB
MD5d985875547ce8936a14b00d1e571365f
SHA1040d8e5bd318357941fca03b49f66a1470824cb3
SHA2568455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf
SHA512ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD555700f1cef63315093bab2b3034890b3
SHA106e5e44020af9451407ea27a0fa4b52b2df7984d
SHA256285b211170c5a769ab803e02e7ce14e31552467394faaac32758ed83dabaf122
SHA51236d366863cc8994528470687c84d1b3ff4e86fbedaad545a5c9409197cfd2522147ceca63baba4d7e30e7241e56249a061e441f4a4985878e20251da85039151