Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 14:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://quironsalud.ae/
Resource
win10v2004-20231023-en
General
-
Target
https://quironsalud.ae/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1000 msedge.exe 1000 msedge.exe 2568 msedge.exe 2568 msedge.exe 3556 identity_helper.exe 3556 identity_helper.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2568 wrote to memory of 788 2568 msedge.exe 21 PID 2568 wrote to memory of 788 2568 msedge.exe 21 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 4420 2568 msedge.exe 88 PID 2568 wrote to memory of 1000 2568 msedge.exe 87 PID 2568 wrote to memory of 1000 2568 msedge.exe 87 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89 PID 2568 wrote to memory of 1596 2568 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://quironsalud.ae/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe031846f8,0x7ffe03184708,0x7ffe031847182⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16469207064925409289,38001220873808225,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3252
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5df7f7d56904fb78ee1d4946892140044
SHA1a8ce16aced32c696a01e228dbfa3e1a0542dfcc1
SHA2569284f1ed7df3399dc3b54fdf4b2bb4ff7e9aac3e56d368383d4a2dc77b522418
SHA5125a390b4c1ce442afef08a920571ee094d00c816121302a713cfac7ef7614f3e5d60ac572769e05f73413dbdbef73e499df3990d7543a011554947d6a02a74dcc
-
Filesize
1KB
MD5628fa6406a4e4f0eeedd0f3f540c797d
SHA1bc0a67249856a71cf992f046f2941d6c672ca1da
SHA256bd8191a7ef5d1ac569a431c9a43ee23eb92e9d3ccb95e06c5ddba21d189269f1
SHA512abbc05d661b20659e89a6dcbd968af592d3ecb1dba45c3f0cad960b5e652ea5684595542270b273495718a904912e3f5138a9b078f8d59034a84516ee393b441
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5dc0472b5b66947a204bec71032bc75a6
SHA1ead1fc67c38a779d53e6b044feb265bbaa315fcf
SHA256662551d1c1a2bccd3b7f87740ac6c42f04985cb7f279504765ed56da580f2732
SHA51257d066a10cc78db9b8ab7e3eaaebb14080fc54244b5614a3c6693c45a5a966c1439ab973bf0558778a22762a863ca36fd316d378ca4ef0ce907148f9f514e734
-
Filesize
6KB
MD5b824c4edb87271b429e9428c294c97d5
SHA1656613c49df42ae58d0bd29ebdf5013c61558785
SHA256d19ab7b370c8f1c0683fc0749fdc31deae4d42faff865c702c0aa3515b4f52ae
SHA512ffa46a1c6ff46d6e951b98e7baf391738d6ea1b4f654e6d00abd22c9e59e7754d62e2e8642de54adac9e385e27439b46e2fb79b0a8913b1514967266c43bdcc9
-
Filesize
24KB
MD5918ecd7940dcab6b9f4b8bdd4d3772b2
SHA17c0c6962a6cd37d91c2ebf3ad542b3876dc466e4
SHA2563123072fba0ea8e8f960dd213659a0c96ce2b58683593b8ea84efac772b25175
SHA512c96044501a0a6a65140bc7710a81d29dac35fc6a6fd18fbb4fa5d584e9dc79a059e51cbe063ca496d72558e459ffa6c2913f3893f0a3c0f8002bbca1d1b98ea2
-
Filesize
537B
MD5db9bfa272733a02faf870dc974ce0ab1
SHA1c9ba26be99e61e80420066d00deb8c0f5e399ca2
SHA2563af219089e64fbdfa9dbc653999592b32c27ab3271a590eca22159aec989dddd
SHA5120d66ec6777af9783d46de3273634b3e58547c79af5495c3aacede0bcedfcacab2e16ee03b76e101565301e0e444063a96a478cb4eefa67cd27ffaf4d657b0cf1
-
Filesize
370B
MD5a7f0dc84bc744d6b6b77e19790c3ef49
SHA15e7004561849de24e31ea6f1d8b2c75791bca64c
SHA2561825eb2456284d17e10352d8cb28f90ffcbdb58fff041cf8e991840e9a4ceef2
SHA5129fc8b4e4287ffff809667aa595b53ded022f4189248a935bb78259f7d20945b2f622297170392637877e5f2285a150fc06a751fdc31c21879b067c20547cf222
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b173c7506ace2f1d37914871b621a276
SHA17e41979c0896aec63160f99189f6ecf7296a1b94
SHA2569a455dccb67bfddf1353b238e1c6aa58e6864a989e4888e3aff434c8505eb2aa
SHA512007fddd08ecba6c2ebca2eab538f0b068fa5e9ffe07f16b2b0e0159b825a183ef161a4c613db4a959ed3d15a2a79abe27bc025ab362ea5f61ea0f15a69307113
-
Filesize
12KB
MD589288ec93ce077550cae7cfa7c4c4c48
SHA1b224bc8961491dc2c70a2e7364ee2c78e5e27dde
SHA256a650ebbb79c96965eea82e1544b21d5d6dc1585a157f2a99a67bba0a32ad5f0f
SHA5120566a2f5c5d5aabf61abf2e817b3bddf85b3552edbd8b60cd7d3fd17ad6b451a46999acf259d5d9fd4faab40883553474318ef0cee0c73a247e463f110e653ea