Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-09-2024 04:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://myrevisedat0assesments.online/index.html
Resource
win11-20240802-en
General
-
Target
https://myrevisedat0assesments.online/index.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 5916 msedge.exe 5916 msedge.exe 5448 identity_helper.exe 5448 identity_helper.exe 3660 msedge.exe 3660 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5916 wrote to memory of 3436 5916 msedge.exe 78 PID 5916 wrote to memory of 3436 5916 msedge.exe 78 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 2076 5916 msedge.exe 79 PID 5916 wrote to memory of 3412 5916 msedge.exe 80 PID 5916 wrote to memory of 3412 5916 msedge.exe 80 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81 PID 5916 wrote to memory of 2184 5916 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://myrevisedat0assesments.online/index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff6db93cb8,0x7fff6db93cc8,0x7fff6db93cd82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:6064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,16993692964730022643,13158448324666845559,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5424 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b4ae6009e2df12ce252d03722e8f4288
SHA144de96f65d69cbae416767040f887f68f8035928
SHA2567778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d
SHA512bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1
-
Filesize
152B
MD54bf4b59c3deb1688a480f8e56aab059d
SHA1612c83e7027b3bfb0e9d2c9efad43c5318e731bb
SHA256867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82
SHA5122ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5408bafc116307d44ade9928f9b8b1121
SHA107a030df3216ac6165b4f26c0fc1d6ae45fb90b6
SHA256174090a2153977ae7216e1e1abba8c2e5c315c9be6a4280df0b00c82ffb6b1d3
SHA512124eda7626eac65be65e78f80289912377c2cf217a73830e635839621cc20bf845caa20e3bbd4ea1ad79e6554ce7b314f9457a9badb99137f260f05019920f35
-
Filesize
486B
MD51b664807e2e8c70c5824605958f56ad6
SHA16ed96093bd8ee26dd3bb4a6855d74a4985f39145
SHA2564020e9779070197c53d4e3f4f706d7c361662ecff3aebd10f1da0f9029a18bbf
SHA5125236e83fb9d66d2c41e8dd1ce89b4e5ed49088bf0de249a62a030af74e4f2450377d86b9fe8858d3287eda81e3a2ddcdc87af076ac920afe1a06840783798621
-
Filesize
5KB
MD54144b7cc0beb216c2765689727f6c22d
SHA1930d4aca0c4c5b2491750b4cb2fca111f118b1ba
SHA2560dc29a6e510143971aa54ac4e2a42abf8003ff528bf8fdd42340c812d0682bbe
SHA51252b0678dbb476175257447241f77ecb4035a113be4a0068fcdafb28c08dcfeac3122c78aa6d19773553e6648aedd9e9e79dbd711764da54d59ec6c7b813842fe
-
Filesize
6KB
MD579fcb427e6140b35956ee3f1e4f9db99
SHA1abdf23ec0fbb338102dab54f4e9e335d0f353abc
SHA256cbbe6aa2b6ba8e8dc5c6637aa214a5997ea413f3bd7297cb2f19ea535f547a2b
SHA5120b57bc203f70d0269ad2619fffd2cec39843168ef847e2bfc0e5452b119063fd0bc2c972e892dd1238be9132e7118e6bc6fac6377e3b12fc2761b9511de49193
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e1158b9bb90adec9ae7429493491dd38
SHA1d9a60aa2202e1dc08e5d2d6e18fa02952dfcbe5f
SHA256604480f45b7caace644507a1d68da33fcc8a004792d6bda72fad7a1489d6d2c0
SHA5125a3bf1f1282e5f5423ed45f5316dcf96afe2c5ab80f2fcf38c8e0b34a7f4503df8617106beba30ff7d796b8e93323b67f8eb656d3b36ae1e09e0cd16aeeb7ce7