Analysis
-
max time kernel
56s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 08:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.ebenefits.es/fps/public/emailTracker/viewed?userReference=Mzc3ODE4Nw%3D%3D-6991a67bfc4a162223568620af88a23cc231ebed223c1a983ce6513a7da0bfaf¬eSendBatchReference=NjkxOQ%3D%3D-dd1cbdda4abc34941b2de4709cc49823b908c2222b4b5eb770f3ec2da8bdbac6
Resource
win10v2004-20231215-en
General
-
Target
https://www.ebenefits.es/fps/public/emailTracker/viewed?userReference=Mzc3ODE4Nw%3D%3D-6991a67bfc4a162223568620af88a23cc231ebed223c1a983ce6513a7da0bfaf¬eSendBatchReference=NjkxOQ%3D%3D-dd1cbdda4abc34941b2de4709cc49823b908c2222b4b5eb770f3ec2da8bdbac6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 4160 msedge.exe 4160 msedge.exe 1616 identity_helper.exe 1616 identity_helper.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 1472 4160 msedge.exe 85 PID 4160 wrote to memory of 1472 4160 msedge.exe 85 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 2816 4160 msedge.exe 86 PID 4160 wrote to memory of 1588 4160 msedge.exe 87 PID 4160 wrote to memory of 1588 4160 msedge.exe 87 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88 PID 4160 wrote to memory of 3120 4160 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.ebenefits.es/fps/public/emailTracker/viewed?userReference=Mzc3ODE4Nw%3D%3D-6991a67bfc4a162223568620af88a23cc231ebed223c1a983ce6513a7da0bfaf¬eSendBatchReference=NjkxOQ%3D%3D-dd1cbdda4abc34941b2de4709cc49823b908c2222b4b5eb770f3ec2da8bdbac61⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa2ce46f8,0x7fffa2ce4708,0x7fffa2ce47182⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16084859320650623236,9635177930596434221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:4460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD52c09dea894621be0e9d440e14afc6679
SHA1e9337b2f20d2db3baf8c1cafa882f5b2c6cbd7ca
SHA256b24e6ec3737ae2bb69a4413a3e3209ff5c7adb402614a80ca1d3d69d43c57d19
SHA5125b231ab8d6b36593eae039c2d527b4efd219f77b271dac2835a7845d55630f9ddf8140c1e15788f4f28a47bb3ddf9afe7f584fc02e0765b976bbe75a9b66a82a
-
Filesize
5KB
MD5ca290a262b75f2c5339df38434aea534
SHA17e8f82a80c27028e8c933db87757ef5d9467bf54
SHA2565e756018f6f07dedc6f839b9e5653c1bf58d1037a72956a9d84d2ef939204b73
SHA5128804a5bd9ff9cba644cfb87d00457ef342931a64a28f920ea42cef6cdc6cd09380496a41e60bde78132bfebb0bdf43daaf7ef32034015dd75e5f3f457e95ebbf
-
Filesize
5KB
MD5fb7067a6eefd55a57ca13a782ca51289
SHA128f87fe39e1139a779a68996b2a5c35880219c38
SHA256bf502d588f984f05b1bc545c7611dd57ae4a62fd41d04c9c27be8a5bebcecd11
SHA5125fabcb23dbfa6dd3d790b1389f127a90ffba9ef673a1c7b6950cc9bdb07f49be2920ea530b31f076be1b7a1f7bc23a2c603068d6f66762155036af15025726dc
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5618dc341b1c60867df1ed0cccc478a1b
SHA1e1aa0237946e12cf36011d5819e53f6634e88899
SHA256daed1f344cc2974b83f01eba5ae5c2e2775a8f4fef58e2ee86271aca48d77b03
SHA512837e8f123e1a5d52deec8851b111e238e292c4632a336e1957c1a1910a5e6911478dc656b721641bd50b1aae0062d17fed076c8d5dd8666dfe7b9fa4dac0f0ac
-
Filesize
10KB
MD51286e7def0ce2b2803cc71f6688e52e7
SHA19790ec04e1623c43e7dde73f95f81a9a95839a6c
SHA256abaeff948b2c8cd0ad3cd4c80523e30375c439a0243c2c2dd938a633dbec6fb7
SHA512535af4b948382e09796092eddbd723f3f78cecde384474f86f5cb3332b220ab4fc6e6dc59011fa05ba8dbb34d6b16e8c507b5cf119109125c039b09399978fae
-
Filesize
68B
MD556abe4cbc175363da0810882244b34ff
SHA1aa104dddfbbb9696856d5bc3a72bcebb3091bc73
SHA256c3087446afe87c5da27035fd77db71f3d9911966b3cd33a452f80d731fbf8159
SHA5120a06bb3beb4cf3a8e12e1fe2937ecb0d16362199954fce9bddd1eef680c9fe3b84dc3c85d52ee9c09f9115d986e2c79f9c6a0d2d3d53101fb1099ed56507db06