Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 03:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://au.oxnssi.onmypc.info/mygov-login
Resource
win10v2004-20231222-en
General
-
Target
https://au.oxnssi.onmypc.info/mygov-login
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 396 msedge.exe 396 msedge.exe 3076 identity_helper.exe 3076 identity_helper.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 2364 396 msedge.exe 86 PID 396 wrote to memory of 2364 396 msedge.exe 86 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 2056 396 msedge.exe 88 PID 396 wrote to memory of 5012 396 msedge.exe 87 PID 396 wrote to memory of 5012 396 msedge.exe 87 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89 PID 396 wrote to memory of 3888 396 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://au.oxnssi.onmypc.info/mygov-login1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83d4946f8,0x7ff83d494708,0x7ff83d4947182⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8804964774194806991,16626940304232011121,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD55c1127e320b0ad16a0c4031a59c20d4a
SHA17813b9f50c21e9f2e88c759a70b0348413ff7362
SHA25663af0e50064df348fa3d230d391378fca1d9aac0fb2b123ec5d40c1fddf4908c
SHA51247fdcd9ce946d70c779328cce36a3a276a0d4ae5bea1c1641c027104de18233d87b2907ae0d4104453a242d72b581d698c840a3403d4e34f7dfc761aa4314670
-
Filesize
1KB
MD5c35ee1214448d53083c2d1d6b104d00b
SHA1a6506a1ff329ae5e3a282e2532c6b74b8e2fd5a4
SHA256933ce4efde3ace24fbed47c11a525c0e636bafc770991ff602f73ca4218dac09
SHA51221559e42db271d68f396a7797ed346e2a0d69845f9dcd3c778919e99802fd30ffc17a3ba64205279177f3feb9a7dbed1821c82aa368c08bd164b4ee12fe4bf95
-
Filesize
1KB
MD5b32d1c5eaa5aef6c7e6e87120c33a01c
SHA1e04c7e6b8e955254ad3c554a8ffb4896df430975
SHA25666ff1df23012c32623f2551175b44886fe9492f5bea2cc787e67a8e2b4f69232
SHA51246bfd77bf696690079abe1595a99ea5bba089917a0944c79f7ae0c82ffb792a5286d9a4ab572c732ca7f0967f8a0c46edef8765ff16e1462e01db74581fb3e78
-
Filesize
6KB
MD56cb78e1ac4d293a56f9be18644d05ece
SHA124b1cbdca117c3d543f052cad692ad58c7c8535f
SHA2564add224a49c1d6d8610ea2b81de323121ee7461ef8f3e6cbe300034d00827be3
SHA512f82be23f3d67bbd826830171e28b2824b5a5e8727ed3a940deb2269020aa606b18106bca782862e97c1dde33e9f4fbd2243ba3240a8fb583fcd8048b89a65b5d
-
Filesize
5KB
MD5cf2ee0ff788489d898b5f71feb1d76e9
SHA120326d9a0317ffa16b28eff02814b3b9bdde5cee
SHA25618b2c271b6a104270055943edd60ed24e11d659bab2c6b21c1a69a6a86b5296e
SHA5120a41215f07161e8db20cdfa65f65a2bbbd9db29c7f33b7a337ae0979381414ecf09391526f2556f55c6888df826ee7e602dbc58d2640184de72c67a167fefb05
-
Filesize
24KB
MD51b1b142e24215f033793d1311e24f6e6
SHA174e23cffbf03f3f0c430e6f4481e740c55a48587
SHA2563dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1
SHA512a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57ed4908a53bcd729e36f4a1568dc03c1
SHA1db443668d78b43f22a79f9341de451f0f537a2a8
SHA2562c4e57ae89f32087ad5fa47657235607a0098897ff0f01cb237dd8be65f01e15
SHA5126b2f6a0422471eac6dacc97eaad7c5eda4f3a85b26f52911cefa3c101466ebbfce5a619ceafaec41bf6ea10913a2f86505432c349f89fb12bb4a33e013f284c8