Analysis
-
max time kernel
71s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2023 03:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://vaciado-pisos-argentona.pages.dev/
Resource
win10v2004-20230703-en
General
-
Target
http://vaciado-pisos-argentona.pages.dev/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4864 msedge.exe 4864 msedge.exe 3872 identity_helper.exe 3872 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 640 4864 msedge.exe 81 PID 4864 wrote to memory of 640 4864 msedge.exe 81 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4716 4864 msedge.exe 83 PID 4864 wrote to memory of 4560 4864 msedge.exe 82 PID 4864 wrote to memory of 4560 4864 msedge.exe 82 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85 PID 4864 wrote to memory of 3844 4864 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vaciado-pisos-argentona.pages.dev/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd919c46f8,0x7ffd919c4708,0x7ffd919c47182⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2208,3519910756693688642,15352779551326769878,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:1188
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a7ad9bb1054aa03e39b3554833d0c3ec
SHA1cbd5b99ca100bc2f1292df23bf8e2a5a6f9640d9
SHA2560c3eae39386b4117ad26187afc4933e254468cd12d813271f4b7420cee73c189
SHA512d1d0b77e0bc412b4ee687e849531a7c9b70200d45d0bdbf38357b6fc59af835522e749b2fd8c2d4cde73518970568c38d73416c97381a11cc6029c14b1678276
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD50c73c8ba0cb40059656aa092ef563bce
SHA17bc72f25aaa2c530d3669418371a59c940d03c4c
SHA256fa8b32a391db33125356f7e9ee53439f767f18e77a6c7dd610ce2d75dfb200ee
SHA512af465fd4f387973f8498555f9a7881b6613d3fb48e80dbacab8974e357ac50c640fb6ec2a43e921c58283d8c58a14517e416f1d8730bb671a87b8236488f1f91
-
Filesize
201B
MD5da8e68b0c168c0ee599b081e577fd7a9
SHA11f617851e075307d9386039c08f22ab21d77e34e
SHA256f1ebf91d63a9bf51ffb0da2b59d3954b63d31f7096f57634c4ce5eac685f17c6
SHA5127658516902e378c018bcaff8267651f8527d68328858fcd371b4fbe417fa77f41d8b7c900f44f731dc11196f9f9f0be592d25d22fddc24e346ae35ee2a09c95f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD54b316b894e9a8be8e09b2aacfbf083f9
SHA1c73282bdae82e5259034e75798fdd538c35b6ddd
SHA2561dc77674e9ba57b55a5e12d4e2e076b186e8149b42be78d77448d7b1ee78924f
SHA5124d8c7b40b93dffbf4742559db5f7b9cd2e757f57784a991b25e03d811954dd5667e38503d4dbf642711209552260bec7a54ac928d3d371d0e2b73bf13bdd999b
-
Filesize
6KB
MD57fd0bc8af2da4eb32d86d4841c817783
SHA18fe70eef12592a6344a57803cebdbc3486d5fa1a
SHA256edd658e09fb1b2d1b3feb41fefac1363ceaf485cae667d15652f03888c0a1da6
SHA5126171636d63be1c12429c012963d52cc41f2eede64989d35bb8ab8922e828710d09fdb0cb7fe3ccfb95af659c47f2cbcfa7342ff45f3497770b438233f2b6a19b
-
Filesize
5KB
MD537920bba0eb639e6df993bc0af182fe9
SHA1b350e309dbe059be11420bc51392abdd9a7b42f8
SHA2562d7fc1d9b2cb20380f7c18deeadda9f4ebca33f69f7ff6ed49edf398169055ca
SHA51266d24517bf1d5cb03948d867db10cf24f0a10e850307df5a7b5a659a87078257cc6b4d116bca245c6bb7c6d186d5d75401c2c616d404c67ad9f8666f35abd678
-
Filesize
24KB
MD5e62cc4051e1f8eaa0abda5d730a2496b
SHA1d15346e40b196bc313cbfe5ac96b3c90b83345be
SHA256ffb5b740b8777d010f0d32a120092084c3cd32eaceb937188d698ddc22df2fcb
SHA5123e8f6d89c7c153177b2149d86cd8602ceafedf66f5335a86b19dfa46fc38c47f6ff9a272c3b71b4464a5921ebdf2461fba25692ca916b9715bac520bf1e81a22
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b97aea914b28feeb0119ba369eaa88e2
SHA148befe595e8aa7d6846994b4193e74a7432f48c8
SHA2567a7605044007e0510f1c725e664c715f45150c13c6cc5308929e5f52d0b6e365
SHA512daf44e3eaf7aba4a92f3db2f2d595dec5bbfeba906fecb546d482901483b42b0f95ed0521c121f6af7e85e90880345d6a5647b513c984e5bb62aec13317c428e
-
Filesize
11KB
MD5f980c2bf6b82fead9a6b0ee4006889df
SHA1000349649a6312acbc6ff9a8e4b44277e06bd999
SHA2567059e49da0b7422486abff33bf17fd3198640b581c13070e5b9b66b389d64ea7
SHA512e3434c3239ff36abf10fc47d65df94295c80ede49f437b56546d7ca92c5f373c1c5b824e9fa2d67c1c953574940920ca5d32594fa45b42a6c7456b088be89fc9