Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 04:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mytax-au-update.info
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
https://mytax-au-update.info
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral3
Sample
https://mytax-au-update.info
Resource
android-x64-20230831-en
Behavioral task
behavioral4
Sample
https://mytax-au-update.info
Resource
android-x64-arm64-20230831-en
General
-
Target
https://mytax-au-update.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 3272 msedge.exe 3272 msedge.exe 4556 identity_helper.exe 4556 identity_helper.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3272 wrote to memory of 4572 3272 msedge.exe 37 PID 3272 wrote to memory of 4572 3272 msedge.exe 37 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 4900 3272 msedge.exe 83 PID 3272 wrote to memory of 5052 3272 msedge.exe 84 PID 3272 wrote to memory of 5052 3272 msedge.exe 84 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86 PID 3272 wrote to memory of 4108 3272 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mytax-au-update.info1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff61fa46f8,0x7fff61fa4708,0x7fff61fa47182⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17236832478293052130,7090476431141747864,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5339cf03344c0309ea37aae51f745024b
SHA1a72de872cc745761da1fce4c50ab16ec43d356d5
SHA2568d368fd5cae9d66244acde5a8d63c7c83552b71a0eb3b57aef3d9cafe0b856b2
SHA5128353e8bcb5041c3fe9d1605aa854a6d79acc93af0236a79471fdb87c000072a4fc0c90fc7e5a4595102c97ca0dae6b344bb795ebc85c3c8383060e0959677ccb
-
Filesize
477B
MD545ff1c02f982471c0d533177c4b30312
SHA17ad74e8ef69844c33a3dfb8acb6e89a1610c73bb
SHA256d0ca6631d884121b756c55729778f1f9db68d6b97b3f0a04f2b9899af621c7de
SHA51219aff366b42356916252b17f0c655c7e47a3834da40dc07d2940bd424b58b57f14d687ac3e4ad1bd7c0a5195cfea525b7768b377107217465a3900a164e5e944
-
Filesize
5KB
MD5935e6dd57e6c6d0c74e0696b19527174
SHA1a75bb0655382812817b4ff32def0f638bc9a2144
SHA25687d4f6209d4c76c639a0b60de0ca92b51a5331ed0da1f85b6adb3ecd0864d1f1
SHA51236a1c20844f61664e409d6b90b8311bb7ee15d8fd0775416dc95c3b16f56e1a948acb572122bee58eaf467f21424c27167c25ba030a5911b4f7cbd8f12c91b01
-
Filesize
5KB
MD5eb2575946d3456ff8b324a02efce1f07
SHA14f46664bc1dd15eadc608849d1234595f294387a
SHA256d8cbb0ac718115423f8458ba4cb3b1eb2297f536b928dfc0a936309a973ea040
SHA512634ba75abf195b046e9f58f5a780004c51efddcf8be35d5bcad7bc1337aa07b391edfaf3b8a99d1a18428b3b2e2a5846921ccc9243f6f23d71135337f86aac5d
-
Filesize
24KB
MD5d555d038867542dfb2fb0575a0d3174e
SHA11a5868d6df0b5de26cf3fc7310b628ce0a3726f0
SHA256044cac379dddf0c21b8e7ee4079d21c67e28795d14e678dbf3e35900f25a1e2e
SHA512d8220966fe6c3ae4499bc95ab3aead087a3dd915853320648849d2fc123a4acd157b7dba64af0108802522575a822651ecc005523c731423d9131ee679c2712f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d075e846-b204-447c-8e84-49183024f45a.tmp
Filesize111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56e323b58dc7e91b4d62714bba64917cc
SHA1742ae14c9b89e328beb9b9784d279082465d78a9
SHA256527f811cd8e248bfdbbb0f4e1ec3ce79f88bbad4e456e72c124774676b304a28
SHA512fc21ec347e115701fb1d7f44f75ab74cee5f2c7603002d829603f2c2a605dbfa837d35387506863e62b1f695bc89a807653e983d8d34a8928bffc5eca31a7a94