Analysis
-
max time kernel
90s -
max time network
86s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2023 23:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://myausrefundservice.info
Resource
win10v2004-20230915-en
General
-
Target
https://myausrefundservice.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 4712 msedge.exe 4712 msedge.exe 3548 identity_helper.exe 3548 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 1904 4712 msedge.exe 25 PID 4712 wrote to memory of 1904 4712 msedge.exe 25 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 3876 4712 msedge.exe 86 PID 4712 wrote to memory of 1484 4712 msedge.exe 88 PID 4712 wrote to memory of 1484 4712 msedge.exe 88 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87 PID 4712 wrote to memory of 3616 4712 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://myausrefundservice.info1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffade7646f8,0x7ffade764708,0x7ffade7647182⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2872106417865242942,15813889185913905924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD53ca029009de14677ca8cb059941ec268
SHA11b72f4793f98d50dba8bc8cf1b471e33071142ba
SHA2563a1488a168242b9be8ee71b99d4c781081923c8c36b5eec5c2a497a9068a24ec
SHA51273d38b68de199cce24e70f99a511d9359fa6e42e0e8e8d3df3606a41b78526d248023a23968dba80a5979580d2dfeee3934191bde45346a168a0acb8d9b864cc
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
959B
MD5ce235c2e5947df393ff175c491977d28
SHA137bd93e55133b7fa2ddb8de14c2d114b081ee5aa
SHA256784e522d9754bceeb4810451681ab62a2a98f31c75c27a02ed49cd08529e6b7a
SHA512e569eb182694338f2f650db684a8e94dcf6f517691430c3488ff5fa7ed12cee62b13694452d3a90d7e75e051aabc60acbec00fc37f1bb027666b30bf2b18609c
-
Filesize
5KB
MD58eb8df0574078e298e091fade973c380
SHA1e3c1187af1e95a1ec1f474380dc55f161d2e783f
SHA25630afd9bf55d63b08f364ca47d019618210db72ec513ce8d8587691983a1f2e7b
SHA512b37d6e0a6ed3a6b54caa732e3db05c94b3f566c286b88207381350899a41f9c28394ad0d085298cb07f339b3c964ee0f5dc78e7f5f745cf0182d1ebd025796c0
-
Filesize
5KB
MD5e7468ace3f17140f8e32fd08bcbffee6
SHA102b7cb5f8ab48d8a2412c826daef35a41a817cb1
SHA256092ed0ec8759a1c84eb046428f0dfd383a57e2d298807c68403e3271ef4364d5
SHA512b9c357c01077946f3a337fbbba7f17a652513cfae27adbb969bf570f6256f0f465aec36e52b6d6f8b10269b226186e431645bf7e951f3be0412195893a89f68d
-
Filesize
5KB
MD5c1dcaedb644d701c5d7d51f2a715d8f7
SHA1f2ec57a811c0b3761c782c4cfdd33717d34990f2
SHA2560c340a0c8f5812a88918cc4e2a098956f46004c2254736ad779ac1c82e91e65f
SHA512bfc71ee600adb49d1bd47d6a86625ab810406a2f0558e3ae52d365edc6455eebf8dbefa1d8d80d4f1736a8cc3614b17a875f5b1a8d09481add1aad835ce85c95
-
Filesize
24KB
MD5699e3636ed7444d9b47772e4446ccfc1
SHA1db0459ca6ceeea2e87e0023a6b7ee06aeed6fded
SHA2569205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a
SHA512d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51f3089dd03a8882710ea24c58c49d37e
SHA1d7c944835a2d1a20813e26aa94d4320577e8f7c2
SHA2560dc0edfad814206ea76acfaa51158d746a58d662dcab320a59f4752e00dc01ad
SHA512ec83d3ae2523ce25b351b8e24e48e84d8975ea82557db11248f6dc35c147ed8536f2d371d4c62f30bfb77563bd06b3becb532473f49e92003c6b6930f2daa6ae
-
Filesize
10KB
MD577e2124328b0d89c10e52c471b43477e
SHA125863b84138276d7f1d7f3cfdb2ffa8a317f1bd9
SHA256b41ff44019e7e1abf766ff5673d6b600ae84c62ffa39745a8f987fdcaedaf4f8
SHA51211b19563d9ddccd13f85b2f2fff5c2b7d91e464640633210a157ba203069e8e368d65db9718e6ec7e73c906a4ba425f21b290b5bb62f99661f1117a34873421f