Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/05/2024, 23:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mygovau.net
Resource
win11-20240419-en
General
-
Target
http://mygovau.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 3112 msedge.exe 3112 msedge.exe 1212 identity_helper.exe 1212 identity_helper.exe 3484 msedge.exe 3484 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3112 wrote to memory of 3156 3112 msedge.exe 80 PID 3112 wrote to memory of 3156 3112 msedge.exe 80 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 3904 3112 msedge.exe 81 PID 3112 wrote to memory of 5048 3112 msedge.exe 82 PID 3112 wrote to memory of 5048 3112 msedge.exe 82 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83 PID 3112 wrote to memory of 864 3112 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://mygovau.net1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe6e853cb8,0x7ffe6e853cc8,0x7ffe6e853cd82⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,13934841814778287675,16414593280361377153,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3392 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58d5e555f6429eb64461265a024abf016
SHA105a5dca6408d473d82fe45ebc8e4843653ad55af
SHA2560344fd65882ba51695a10e1312e65f08d58afca83771c9d545e181829d6b5ed1
SHA512be5edfdcda1ba0db9fbab48ee1b643f1b03821e24048892d18033094fec14171035179e987a08dd91a1c25d91d9256837a4105f6765afd225a868f3e95050b8f
-
Filesize
152B
MD5b5710c39b3d1cd6dd0e5d30fbe1146d6
SHA1bf018f8a3e87605bfeca89d5a71776bfc8de0b47
SHA256770d04df1484883a18accb258ecfa407d328c32c0ccbd8866c1203c5dfb4981f
SHA5120f868e4ce284984662d8f0ff6e76f1a53e074a7223122a75efa7bb90d0204bc59bee4b36c215d219a03707c642e13f5efce0c3c57f46659a0cb1e7fd2f4d3cf1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD592cfbc77e68cd45fd250f22934a181b8
SHA1a912878aba82da7fb02f956ee2664475c799f8b4
SHA256b9d6eb65ddae6972539758d67bba5432448e8bfe0328bc2f155e0a9f906aaff5
SHA512ddfe0deadd2c5acd78dc87f8e61ca3ea4b1e2dd8ca43ad84e634aaa9fa1a4d090afc5141467e139855e790c89dcf5a05586fa69c3250bee26fec6fa1682809f7
-
Filesize
552B
MD5a18b9706e750ffda4b0a345e8fd72e5b
SHA1d366b81a3a0869a60d5c23f22864f67b438e9d44
SHA256f35dfac27d07134775c7fa9e63c77b9fd5bb06d0aa9e1447c15705a4deb43bbb
SHA512931c665bbff9b61c1787bee08c195a598e76f68b1a0165b32f887bfa7910621d6586bb36dcbde59059f4bad8c695809066bef4469012d960c45a1965148868cd
-
Filesize
5KB
MD584b4b18c760af18124811358c4dd90ab
SHA12bdac231a8ce0657ecef6f99d4f8606cc7f6147a
SHA2562656b98fcca823b7a7a58dfa7b2e832e6091ca4a57ad29732b3f0731b71a68d8
SHA512725a07fe5a416380103f798c8c7712f36f74030a9010d855d5ac6de73f7422e9b48ab5dc09cb6ef53d42fac4106b6cdd2d1af758636ce95906928d8ddd807d39
-
Filesize
6KB
MD5b7c9af9ecd049f872b58fc2e6a6b2c7e
SHA108e2f2eebb52764c731242237555ab79da8a52f3
SHA2564a7b7f36c9301c228b19e108bc2d2bb47df910a0d70cf3ae505b3b4c8ee3a73b
SHA51229fe8274ec0652b0d64d86b0847003c4ae48f44b0a11d5d309c775738352a91d6d4b5b2360f52719f6c95e1bb4b616e0fa8461dba70e43c99eb813bdf590cef3
-
Filesize
6KB
MD5397bd5478b9921586a52a4f6982e3e20
SHA1a62f10ec8447ceb1eda1742897499e9728425e53
SHA256f50b2be23903f4f6eb5b27f6e8173c8c4a73847b6691e2aa7e03e571dad22053
SHA512e249243bfe81b29068fef6a6d840e21d44cdac81011022153f5ba534b7d1c747832aa90965bc111f4f2162237145b91c8bf6e4a51df8d16c0b1fa2b25648692e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD556b0919b34106efdf7a636c3635b56ce
SHA1ebfa8e1a635baea1b7b9c0f8c1c3e6f0088cd604
SHA2564d646ffa9e606c9370d0bd8d8070a01422c510f8827acdc8f01b301b42556036
SHA51214a724042c7af11046c638cd5b2c55435246479b0dd35fcd8f72fed10c63f7575ee452ea6ddf3f285dc05eb309ad4ddb75fb880663097765d9746765aee08213