Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-05-2024 02:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://myatoincome-au.com/login/index.html
Resource
win11-20240426-en
General
-
Target
https://myatoincome-au.com/login/index.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 844 msedge.exe 844 msedge.exe 5024 msedge.exe 5024 msedge.exe 3500 identity_helper.exe 3500 identity_helper.exe 2268 msedge.exe 2268 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe 3568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2356 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2356 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5024 wrote to memory of 4740 5024 msedge.exe 79 PID 5024 wrote to memory of 4740 5024 msedge.exe 79 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 1160 5024 msedge.exe 80 PID 5024 wrote to memory of 844 5024 msedge.exe 81 PID 5024 wrote to memory of 844 5024 msedge.exe 81 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82 PID 5024 wrote to memory of 3912 5024 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://myatoincome-au.com/login/index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe9e2e3cb8,0x7ffe9e2e3cc8,0x7ffe9e2e3cd82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1892 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,11019543277810653680,11033171585713715776,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004E41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51e4ed4a50489e7fc6c3ce17686a7cd94
SHA1eac4e98e46efc880605a23a632e68e2c778613e7
SHA256fc9e8224722cb738d8b32420c05006de87161e1d28bc729b451759096f436c1a
SHA5125c4e637ac4da37ba133cb1fba8fa2ff3e24fc4ca15433a94868f2b6e0259705634072e5563da5f7cf1fd783fa8fa0c584c00f319f486565315e87cdea8ed1c28
-
Filesize
152B
MD58ff8bdd04a2da5ef5d4b6a687da23156
SHA1247873c114f3cc780c3adb0f844fc0bb2b440b6d
SHA25609b7b20bfec9608a6d737ef3fa03f95dcbeaca0f25953503a321acac82a5e5ae
SHA5125633ad84b5a003cd151c4c24b67c1e5de965fdb206b433ca759d9c62a4785383507cbd5aca92089f6e0a50a518c6014bf09a0972b4311464aa6a26f76648345e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5737c7bdc89ba75d867a6fc030c58fbe5
SHA1691f80926b9a0b6f1f916260fed355c92a8abf08
SHA2561232742b17c5a157c93d0df313bd2c3b7f4f629ecbf5e59b74195b85b7c47064
SHA5129bd0cf6eedaf4285737b0ed604028eee31f5ebef7a5073f906f55628b13f4776c39c1a5333da97b2d25079bfa11b15d2f999547134698edc5cf238ad7a5083bb
-
Filesize
559B
MD5c7d6fbfe5733624ebcdc8fe8af3ea6d2
SHA16b81977c369c0971965fe5beac64552aacbea7e9
SHA256e6c0871eb7fb826826975269bddc9f2b29b1b0ad6e3f6559bb6126b0399ee16e
SHA5122c77502f17069962fa9cbf3f573228600cf152874b93b75ba5f75290c78ebbe8dbf47f7acd94a570b06f7e638cab56015c1f9e9b540064a301d2f15c3b77b7a6
-
Filesize
5KB
MD5cc46351c4ee879467d0cf676f4ced56e
SHA110ec24576518444d81f2a46ef526468191889b93
SHA256ed78fe9f7a622dc64613ab718252ee714f9720b97a9b18595f72272615c755fe
SHA512b7e3ae2acd6b2f31b6a294725b59ff7d420fa8b1a03fbdbf87822b076886a5b0b1b5597727cd857b70270f3d2cc3b6362d18de3773020eb7bd05a3ab0a1b202a
-
Filesize
6KB
MD5f3e834972f60ac8a2871db0dd824768f
SHA167c86d74676440f6c910b2f3bdf32717a32b08b4
SHA256e2c41b795b34bfa0d1b3d49de485a49ea44f821f1f4aca27112a7244a016b976
SHA5123f06d8a17f74a166d25ede8dcf757ec6bac6d023ea49483fb7dc80b2b6e378515d2884525205d6b5444598a18dca4053f0192aec5ec8c3880e1bea100b89e4ee
-
Filesize
6KB
MD576d1285db0b09329f582f7c5f3de2da7
SHA151b9d55ba47e0d00f7ce84380c20473d596dfb31
SHA2566149ee39c90ed005ab681a37dfaab0d96ed85c3886fb2201cfcad3e8ece1ef35
SHA5128ae3d86d336031ca64c572e68a607cbeab3d7670541b3215183148a9bb677e659ed2de56037d9aa559e4b8a3f1157020d4c5e5b91682b4a49932e7606be339c5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD533230a31682c21e5894ac2faa60cf0c3
SHA15f3c2dce655cf24a6cefe46d0a040ba22a15233b
SHA25604512d6a40e6b104e02a7c2b8d55cc252470dc681276a85a460fcc3f3643b5f7
SHA512bf8843316ded8d07890008952ffdce93cdbe0c6d9926772904d57f75e27de1e29837d2fddc0497d54e20a2ae9dd2f02385bbd5bba934050e120105ed7d35f2fb