Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2023, 06:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.jcmpsoftware.com.co/
Resource
win10v2004-20230915-en
General
-
Target
http://www.jcmpsoftware.com.co/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 3712 msedge.exe 3712 msedge.exe 3184 identity_helper.exe 3184 identity_helper.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2748 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2748 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 2536 3712 msedge.exe 83 PID 3712 wrote to memory of 2536 3712 msedge.exe 83 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 3232 3712 msedge.exe 85 PID 3712 wrote to memory of 1380 3712 msedge.exe 84 PID 3712 wrote to memory of 1380 3712 msedge.exe 84 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86 PID 3712 wrote to memory of 2788 3712 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.jcmpsoftware.com.co/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d27746f8,0x7ff8d2774708,0x7ff8d27747182⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3644 /prefetch:82⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4420 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,107899924280682760,2197593504601014700,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4612 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3064
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x42c 0x4cc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5f045b12fa32fff935165f7eba984f9d6
SHA196e490dcad33eb6ce62b942f905fd0441e3696a0
SHA256c10d7b964237fd2fa3b269ed58b2707befab30a7ee39233d64c7235bb5b42ef7
SHA5123d0ca90de4e7d5733cad71b15cb0063282e30a46a4014a638a74ec941a3090fe0cec4f5df5bda42b82a7864c43cba85c1b2495e203b9cf8b6348bdf0ab59d55b
-
Filesize
1KB
MD5b41d5dfe605b6d7a7cd1078c75f7624e
SHA19e4c753a772ac5fd0b4b0bf5f413a780cbdee626
SHA256013c1abdd70bf08cc6d8bed7da6ffe95d2df1ff37ef48e9d8fc4ac7e80fdfd42
SHA5127b91d057b4cfecfb80c44c46be3964c7b10a47f10130a32fa3ed6999ec8ab3e80b8009bdce71e8f9ee9b4794857bb3614a61d9b8e888b504ab94eca14ba8fb1f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5da851a808a06d33332dffd5f27bc74a3
SHA14bc17bde7908da6226465f0f64be5dbfa3f1755f
SHA256dde356fd09a0308ec5d943669ed064f4e1ac7a5f8639ddf130d43014cacd8f71
SHA512811a0f4b551b8657cff8efd21e976801d308052430b21e0bdcabeab8b061555bf2ac55a4bf5b109a58b9235251ce64321827cb591f13a1c572e3a06cef70c82c
-
Filesize
5KB
MD5d8ee98f814916bad1ad505326c56cbc7
SHA1c6a78e4b7e7c818ddf586f8f5f8dff81fdcbd816
SHA256e33820ed980c8c489e9f92f5e1fb52695a6a438786da27547f34dbcac017a8e6
SHA5125faf48daac68a3754e5e355c0e58785897fffe69d58ec9af116cdb7ad39e4e64b27a9020cab9e24c19123fb5ac0ef8483670f1a27de3bba379bd0cc4263b212d
-
Filesize
24KB
MD5d555d038867542dfb2fb0575a0d3174e
SHA11a5868d6df0b5de26cf3fc7310b628ce0a3726f0
SHA256044cac379dddf0c21b8e7ee4079d21c67e28795d14e678dbf3e35900f25a1e2e
SHA512d8220966fe6c3ae4499bc95ab3aead087a3dd915853320648849d2fc123a4acd157b7dba64af0108802522575a822651ecc005523c731423d9131ee679c2712f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d2b8f248fb412f76a256edeab4c627a3
SHA140d6896b6ba6b23e6a403f1a61453d3b7d74cc2d
SHA256f25b45c6aaf7f834b5e46debae0101a325c8424514dc91f23aa78ddb71097aff
SHA512b9f4361b827445d09e5775ba152cbb845f93e7cab65883491a27b0fe45ed1a22e036137f1b370c062eaf2223b95e3278c05359eb18f3cf9c52a381b81be794e1