Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/05/2024, 23:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://au-qov.top/index2.html
Resource
win11-20240419-en
General
-
Target
https://au-qov.top/index2.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 3636 msedge.exe 3636 msedge.exe 1828 msedge.exe 1828 msedge.exe 2332 identity_helper.exe 2332 identity_helper.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3636 wrote to memory of 3864 3636 msedge.exe 79 PID 3636 wrote to memory of 3864 3636 msedge.exe 79 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 2404 3636 msedge.exe 80 PID 3636 wrote to memory of 4476 3636 msedge.exe 81 PID 3636 wrote to memory of 4476 3636 msedge.exe 81 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82 PID 3636 wrote to memory of 3028 3636 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://au-qov.top/index2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffefc0f3cb8,0x7ffefc0f3cc8,0x7ffefc0f3cd82⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1836 /prefetch:22⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1724,9672908328420979667,10224223425689706290,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56e498afe43878690d3c18fab2dd375a5
SHA1b53f3ccbfe03a300e6b76a7c453bacb8ca9e13bd
SHA256beb39e9a246495e9dd2971224d23c511b565a72a6f02315c9f9bf1dcfae7df78
SHA5123bf8a2dd797e7f41377267ad26bde717b5b3839b835fe7b196e748fec775ffd39346dba154bb5d8bda4e6568133daaa7fefa3a0d2a05e035c7210bb3c60041a7
-
Filesize
152B
MD5b8b53ef336be1e3589ad68ef93bbe3a7
SHA1dec5c310225cab7d871fe036a6ed0e7fc323cf56
SHA256fe5c2fb328310d7621d8f5af5af142c9ce10c80f127c4ab63171738ad34749e1
SHA512a9081a5a909d9608adfc2177d304950b700b654e397cf648ed90ecac8ac44b860b2cf55a6d65e4dfa84ef79811543abf7cb7f6368fd3914e138dfdd7a9c09537
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\14386547-818a-4ee4-b20a-69604983c8eb.tmp
Filesize467B
MD550c4c3bfa0d5fcb9dc1e550f8041b1bf
SHA102a2b2d95ed226d56b4ca16c9f67768911626760
SHA256b36731b87b45975f8cb88119ca619cc254ae777aca3b85de1c384d0781c11b29
SHA51203f50ca14b95d6820aef68bf5972b09233e513fb5a641d0ad2b92e516416394ce111219ae62d7039d69dc2c7155655d685a39c215e65c856debb4a116ab10fd0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD59365c0a9ef28271693b92fa8418b6ecb
SHA19f11dad98fc95ff9140b53745e0df0768d30ec6f
SHA2560f3029ce385c3444d45fec9c40bba70933691fda647f2a062f21b4ebc59ef6f5
SHA512dbbfd27d81815d17d2c0054381423e6dc2a6749a59b59a2cdf722cd4b025eafaaded95851fd01f69f781da40371c0d0f09a0fc6eb183d5c0b78fe6bf71f1edcf
-
Filesize
6KB
MD5a9b92f4f5597dd77fb59f482c4c6fc69
SHA1d7a879d6170ebda34deccc139ec470623c389a79
SHA25616972709db09afe4006feb70ced8e93538d5d66fe9adb4aff8f664713f00797f
SHA5122e46ea0ed1695fbbda33ee3d59f66d3013fa189aee70a4dd2cb0e4d0d023ca86b7cad22fffbdae6afbf1d68ff623236d688b7a188b0b78a5a5ed574f1f3f8796
-
Filesize
6KB
MD50a54270b3e916f6d5dd0fbd950946942
SHA1b70140de5940e1c9304d9fed8764fc3ec44d5f04
SHA25684408d938f3ab23180521cf1bf55180fe2f7f58cb2eada5ae71407b5d01420ce
SHA5128b76ca1aff27444c737d932657299e97011951a7ac736213fadb26a2b5d9cfe8d346b22995693812b422617a9e307353b57acb5afe072b4967f790d2377be58e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51d5fab0ce86a304ffff441499bb2a488
SHA1fa8801959344f82d73ec51d8e577f610eb80adcd
SHA256d71f6912697ac49f982cea313fb814b33c2974ac517d2260b15e3091a81bc624
SHA512b1598fbdd94d126a949d47706445e257e783904449a3ec6d6a339f8170b8bf0f22827d563619e5f579813a43684806b717a934fe7fe1d85a65c54604e234f24f