Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-06-2024 05:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://myportalatopayment.info/pay/index.html
Resource
win11-20240611-en
General
-
Target
https://myportalatopayment.info/pay/index.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1000 msedge.exe 1000 msedge.exe 2772 msedge.exe 2772 msedge.exe 3880 identity_helper.exe 3880 identity_helper.exe 1444 msedge.exe 1444 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2772 wrote to memory of 1908 2772 msedge.exe 80 PID 2772 wrote to memory of 1908 2772 msedge.exe 80 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1744 2772 msedge.exe 81 PID 2772 wrote to memory of 1000 2772 msedge.exe 82 PID 2772 wrote to memory of 1000 2772 msedge.exe 82 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83 PID 2772 wrote to memory of 1004 2772 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://myportalatopayment.info/pay/index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffed8d93cb8,0x7ffed8d93cc8,0x7ffed8d93cd82⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2500 /prefetch:82⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,7246458182753936772,10873542489528124702,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f717f56b5d8e2e057c440a5a81043662
SHA10ad6c9bbd28dab5c9664bad04db95fd50db36b3f
SHA2564286cd3f23251d0a607e47eccb5e0f4af8542d38b32879d2db2ab7f4e6031945
SHA51261e263935d51028ec0aab51b938b880945a950cec9635a0dafddf795658ea0a2dfcf9cfc0cab5459b659bb7204347b047a5c6b924fabea44ce389b1cbb9867d6
-
Filesize
152B
MD5196eaa9f7a574c29bd419f9d8c2d9349
SHA119982d15d1e2688903b0a3e53a8517ab537b68ed
SHA256df1e96677bcfffe5044826aa14a11e85ef2ebb014ee9e890e723a14dc5f31412
SHA512e066d74da36a459c19db30e68b703ec9f92019f2d5f24fd476a5fd3653c0b453871e2c08cdc47f2b4d4c4be19ff99e6ef3956d93b2d7d0a69645577d44125ac7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5edce481fe5d27931acda47a1717e9980
SHA124bd8c92873aa162f5a5169a657a1b4903cd8ed8
SHA2560101a33e93bfadb401a6d31f07018d965e1ed06521a90f22ff554b1bfc35d31b
SHA512c24a75e1f74b522c673d8b9cd0852a263d26d9ee7a3c2aac7430bf72fb394cc1965f904bb47ece3cc02731d801526a58d6de92143c53615b3988ffa8d4124df2
-
Filesize
479B
MD5189ccbba3397c20c632ee4c53332259a
SHA1189322afa3b7698692fe4616b2cb06eaeb08dc67
SHA2564b0f63644e2fa7d44fc898b3eed5b9ea0b5c1c62a3bcab1ae5b924dd93b52e25
SHA5125fb5189933e599b893edd7ad923c7f08f08f96d1c5e8409eae835d34dec4630d47e9b20df9a167987cee59cb0874d43edaccfd4997affd2e8e5b1f041e8d6d39
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
479B
MD5719e17ad3a30c9c8043df65a4aecef6c
SHA1000239b249c34571f03b453d854f05dcdd5f975e
SHA2563b4739e04ca69c69c0b0c33f10807ef7b4b45cea7d8e5acd443da241cc31ea4e
SHA5124c904d1713b904c13ddd5891fdf65a8590ae3d2aeaf9492b11c7cc0045dc51c05493b5c0e3e11ba93635936e227bc67d32c0f08bb7bde3dfe0898909f95fdee8
-
Filesize
5KB
MD522f44de93d5b29fce2f2c8a5be6ea7c3
SHA1c01d378a2789cbdd8efbef78b1cb4f785a6dcaa7
SHA256f9dbd446749d2b0812eb9c5365b03423cac6105fd6b5c419d35ed85e2d32e99e
SHA512e033a677b7cc003b5f9e30b2bcc2dc543ef5c1c74425e3528cc093656fd66b554ce5844ba50a494a81c5784dd726cf9dacb404bf7c519532633cd20d6b2ee590
-
Filesize
6KB
MD558f87ca988d9291c2e5a2c4eea4e8c75
SHA14832b759cdcaa130e709263a0e81888e18f0bdad
SHA2564a5a3b664fd4957367423f0bf7deedebabd0aaa9bfbf25db92204e019dc95855
SHA512246aec8546af0ebdf1debb230f2a882b7b9712aff6e7b61d4e3fc665a17744cbcbd321fef804d5df1ae31c26070fe9f58832d799b3fb88d5ad1d6534fbdba204
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD50c70344b9e091f7a7557681d3d80ff3a
SHA1f66025ee85eadfca1bd386ec73fd689c85474520
SHA256d795f26524b765ab1994efc09574b9d9d81bc40e8ded16be466d4e51ad0abb7e
SHA5122a735fc7d071d2d51b2834fcd51dbb3f6693c1418687379ca35baf8a4e6ba28c490a58fe03463ac0cd4c38f1cc511a59fb3b0ace392a2f8da8df05cb057450c5