Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 23:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://assesmentportal.com/au/index.html
Resource
win10v2004-20240508-en
General
-
Target
https://assesmentportal.com/au/index.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 4984 msedge.exe 4984 msedge.exe 4236 identity_helper.exe 4236 identity_helper.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4552 4984 msedge.exe 83 PID 4984 wrote to memory of 4552 4984 msedge.exe 83 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 456 4984 msedge.exe 84 PID 4984 wrote to memory of 3744 4984 msedge.exe 85 PID 4984 wrote to memory of 3744 4984 msedge.exe 85 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86 PID 4984 wrote to memory of 3572 4984 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://assesmentportal.com/au/index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6dc846f8,0x7fff6dc84708,0x7fff6dc847182⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17276462842183796846,5294551319965362230,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD51dac943ef8df27307342733ce0bcaebf
SHA1df3e6e1cacec8598bbed4d66d8a38fb2b201a557
SHA256be5789ababe334db306d5b939f2d07c2817e7b01230c3e4a94aa630f5651259e
SHA5129bed6c025c4919299edb4146c6421e71deb57221b2c741b73f016b5200e92b2a1eff278710c6fd01f4881dacd729d349173a4c3ec254c4175ea1bb2c69779b69
-
Filesize
477B
MD5ca0a92935cd5f829762e70af1327fc62
SHA1aa9b3c4698a9e6fc39472d4d37379074c343e6e2
SHA2567c8ec6e196585aa4f770f7a4ac89a96494e2f3b57716f34c66617832e2b2ba21
SHA5125967fdb2841f98feb341a4ba725f9b15aed99c503d3c260dc839e6104e266401751066983167a21d30904f6687d253dfae7cf2359f476c406f7b2af6e217487d
-
Filesize
6KB
MD5a081cad2ed4f69b2ca62caa04ed20498
SHA158342d2812703a6e3db38f3b86d1c0ccb370485a
SHA2561fe29ef1eff01cdaa3e4309d9231bb030d2a106fb3b25cf78253444e912e9a67
SHA512ebb5fc699809b0dc33d433b2f17f3359179b501f7dbe201766c231e4362a2a075c9e218a02578cda5936ec3e6cb3294ccee714c27f18acc07f1cdcf558b7f635
-
Filesize
6KB
MD5306b35e6c6e707155307de2740a838ae
SHA10fbfb65e591b9f741f38e00dcb47113cbf64c007
SHA25686d95e1bd7072e18b3dc3c2cfc3849a38c890964d3a6d6100214897957060dd5
SHA51261edfcfd7c6003f887514ac736c951539ccde46e8574034cf7da573366e31080df5fa9a79ca9e32d04c5f3d0e0af498f1ade1e69f9b5f34255918b00e29f28a5
-
Filesize
5KB
MD5357cb9cfd1249f6ea2e379315065ae14
SHA103994a2635823336d5b86afe269339f42cf0722e
SHA25620e38939728528e42f860fce80c2c51dff3c9db6eb5e7cd3bdef5166e0a91036
SHA512dd3ea3a980c8676abcde00e5e9e5342f7f8a86971af4a1dbd01df981c7570b153ee12cd11e267d92121e5e269f1a43c45228251db19030a4d414645271aaaf29
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cbf4d94ada50b2165870772f3c5a40c9
SHA1c7b9abb81dd58fc5943a67f8d4fca559ecb137b6
SHA256c64726d6f07eb4204de91424657be6298ba98d82c2b2c7fd583ef7aa438beb6c
SHA51266b33067d86100ef9dcddef0d255431ada854dfa51d9910d8069cf4f31ddac6ef45ef254d9889650dbf0d7b1f455e7ca941b22e595ece7b22dbf44548371e660