Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/03/2024, 00:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mgserviceaccess.misecure.com/reply
Resource
win11-20240221-en
General
-
Target
https://mgserviceaccess.misecure.com/reply
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4768 msedge.exe 4768 msedge.exe 4784 msedge.exe 4784 msedge.exe 3632 identity_helper.exe 3632 identity_helper.exe 4804 msedge.exe 4804 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4176 4784 msedge.exe 79 PID 4784 wrote to memory of 4176 4784 msedge.exe 79 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 2932 4784 msedge.exe 80 PID 4784 wrote to memory of 4768 4784 msedge.exe 81 PID 4784 wrote to memory of 4768 4784 msedge.exe 81 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82 PID 4784 wrote to memory of 4996 4784 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mgserviceaccess.misecure.com/reply1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffded493cb8,0x7ffded493cc8,0x7ffded493cd82⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,8236623948381569413,15027159081838594362,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55c48e8b68231fb5b2d7f1188b930bc0e
SHA11822aef5da8fdd47626fb91afcf79a2be175a325
SHA256c3b287c29eaa57166b2ab1ba9bd0aaced13cc2f946a04b8d708ac429187fe944
SHA5122bd09b83e44e0104fbe080a8573690217dc9fbf7fd59ff25a1a9e9ebd2d87ac533f9b99350773d081a7e748b39657115a13e94538b153bceb13ecdfc4672a0f8
-
Filesize
152B
MD5f2dc80f5403feb8461b7ffa09890d6a0
SHA1d5b61e6d672e7e71571e0132e21cead181da8805
SHA256eadeadba37eed18e5acba408d7e076270b00403fed372b77164577232232428a
SHA5125e2119529b99b76be105c43714e4b9977ee2147172c1c44e92bd9b41fa7a66f55d4073c864aac668a912aff2898bd216fb38f2fe34ef65de69ad12965218caf5
-
Filesize
5KB
MD573b5f38a4544f3c7b3e90c0466ec110e
SHA13a5c46f5002af141c914445eda9c4d8a53830de3
SHA256356601cd262dbc3ca7571aefc9837d5ae9319401130f8d9e038f9ab776a19ed9
SHA5126448459a3a21aa2c436a7ad5c0e2e4dfc776ee347c3d4ef84a09f1c8ddca44f287613f0abecf730a6a7c4fa477b48e84abdd88241961f02431aa9c25b00a78c3
-
Filesize
6KB
MD546a8681849f01a1edc26acac1062be4a
SHA1ffab4e8aa73c1d007ec80b7a20f0f7d87482edd6
SHA25610fea3bf839ba6dfec917159969e3c5fa2d830dd40cc67e054f59b0f69c8850c
SHA512a59179cb2d1e210854247c4dd461c8d9c42ecf2640ab95f0ddc5901fb2e72850876368ada4023a305094442ace57cecf42290b67407a4a3cfbe63052974178e5
-
Filesize
5KB
MD589c44eb72d1651726758c445e8e37dda
SHA11056f80f875141d13b730c28547e30a1a332f935
SHA25639eb685d9ae7e8ceb411d6dd951f4495635645ae53f6c79b1b51f87081db3486
SHA512abddb8d238b5f5a63c8decbfc84587318b7bc11a65a231080eaac44ae5f839d1ae2a9b83d5547999722fe6ec266c4e70fe8e2af915a51010aabd5917841f3f74
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5a0e56ee5febd06995948a28a60e53f82
SHA1348faae837234f300aef7cbbf544645d81b3271c
SHA2562490d531f078c9cc12bbcb7b224f5095be1a2978c55743cd5556033d1a0a9f2a
SHA5124a2a75ed41f62e59e454f6d87ea1e8f774071f4c4fd32bc1a11b719e66c13a77bbcc551336141ad05bf16617fe16836a10827aeb46aea5552ba6c5824371d956