Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 20:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://findetercol.com.co
Resource
win10v2004-20240226-en
General
-
Target
http://findetercol.com.co
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 4348 msedge.exe 4348 msedge.exe 4992 identity_helper.exe 4992 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe 4348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4348 wrote to memory of 3028 4348 msedge.exe 87 PID 4348 wrote to memory of 3028 4348 msedge.exe 87 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 3232 4348 msedge.exe 89 PID 4348 wrote to memory of 4092 4348 msedge.exe 90 PID 4348 wrote to memory of 4092 4348 msedge.exe 90 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91 PID 4348 wrote to memory of 4160 4348 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://findetercol.com.co1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8633946f8,0x7ff863394708,0x7ff8633947182⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,18280593904681048426,6633290455994361826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:4356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
6KB
MD57efab28bb33ac05352783f26e3c65171
SHA1f9d97c83cae4b2ca9590f968063ee83510826ccc
SHA256aa72a628bd7140953b37c53ea9e8f59487e0d2ee8888f428cef45555e2802304
SHA512311b65a0f8259c5262ef05ece9e47aef5a25f40e3ecbb60c589b14905f9e83d284721313999d2559c95c1da82a649ef7b881d7ec30709f80aed793883621dd7b
-
Filesize
6KB
MD52db222d922802b6f7223e8818565c46a
SHA198402175e0c918d60fd7b7489c1da549cdc93ac8
SHA256c5888332159d015e4aa04b845634bcb0858600bd8142d65859dfe366b4aa1ff1
SHA51211027918fa7606433025d3ba9e0136ba4ea3e45acee1a57a63d360248afc62c37e42eef099862bac7e5b16f0f347771470d3a403f97510b1bdee18f60194f7f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD56d67d9be51097ba9914177481c516840
SHA1d8f0f3052fc42bb55f064ae4f34e602cf7cef1ff
SHA25615737612819a8aeb31d64d3068f5ca4248bc5e58444bf5985324ff5112ad7c0d
SHA512dd16640d2c1b64dff1a6dd8401366f5a4935ead1d76bed0b4b7529fbde45744c26d93b566b8bb9dcd0d6c045d76eb4efea3552b1c6a737fdfb3ea01d5523e430