Resubmissions
27/03/2024, 15:11
240327-sk398aeg57 1Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 15:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chaco.gov.ar/noticia-nacio-somos-uno-la-renovada-tv-publica-provincial-2024-03-04-10-39
Resource
win10v2004-20231215-en
General
-
Target
https://chaco.gov.ar/noticia-nacio-somos-uno-la-renovada-tv-publica-provincial-2024-03-04-10-39
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 3044 msedge.exe 3044 msedge.exe 1108 identity_helper.exe 1108 identity_helper.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2092 3044 msedge.exe 84 PID 3044 wrote to memory of 2092 3044 msedge.exe 84 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 2960 3044 msedge.exe 85 PID 3044 wrote to memory of 4968 3044 msedge.exe 86 PID 3044 wrote to memory of 4968 3044 msedge.exe 86 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87 PID 3044 wrote to memory of 1788 3044 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://chaco.gov.ar/noticia-nacio-somos-uno-la-renovada-tv-publica-provincial-2024-03-04-10-391⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd3ca46f8,0x7ffbd3ca4708,0x7ffbd3ca47182⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,5046832758149805945,13963571942139234071,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
505B
MD58102dcb600a3c5b23f75d87693df6712
SHA1a51e520e7099cd692a329310d84714a959cf2e2a
SHA2561b407b9cf8f5a15260966bf7bfd0698e19fd2cf3754f8d6e29f3827f93ad1b80
SHA512109f0943f192b7dcfc55a560dcb332e30b1d7172244e20e47e38a2564183a2b48fbad4383b68aba0a72138a918cb3bdc121c1ab954aa8db8ec1876b8f570a70e
-
Filesize
5KB
MD51b12c5fd564f70374e57d634fb058887
SHA1329d658f232a42919346e0923e5e03d6ddb24471
SHA256282195f9cc3f8357458e93bf7d7f4e9a2d706b78f5783eb333cc688e8576e928
SHA512f8a20a149ca0cba955016288a6ba9a9b17eb1c0f097a073ee7befc7e4ef023f2404aa66ab105da8b237cfebd15ba362c23d7bb537bd57c522485f2a692cfcf1e
-
Filesize
6KB
MD519da5ebb4ca850f7371293eb2fd25c61
SHA19d8ff9716ff2d0268f44fd93309678adc02d8283
SHA256816600d3ce0093a614948ecdfdf71ae8fbb5552e08288bd4932ef6351f08d1d9
SHA5120cde1d605596f6f54a3ba4fd60dbee71a804687335ee410f2d976937078ec35712dd33b9a2e1012fcc365ba01e81f95a86e32dd02097af22658ae89086c9c8c0
-
Filesize
6KB
MD521741e1a2a26d629a1f38416a153d834
SHA11c44df11a3bd69db267f212c1d30b974cf1b221a
SHA256ec8fb5985e477eb222fa89ef6223b32bdb2c5b6079ed0de8e3384c7835639680
SHA51238a3e10e82b0784d4e71599e5c3216dce2dc424356efba31f541ce20dad75c33a67cfea2e1438b12f69771b7c07e585cb2baf711e4ec9f25b6ea228af88f2db3
-
Filesize
5KB
MD547a4a5918d835e9eb1a82c97b73d33ff
SHA1409e90100712760dc82f1b3d66e447d09b3751ce
SHA256ad48d600e0a5446b1cc19b1141688c5250031b83500e50603dd12bf3db9e4b02
SHA51234df3bb2d8b22e6fc66a2a76fbedcfccd8d17096db7236bc1f4abe8565a7108ec1e52e83918d42b8e70cbc43740c2fa189af2abacbd0778656c2aeb13aa5f6b4
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD55510834af14d479b26816c2ab135cedd
SHA1e4bcf5bea32125e0b1095cfce5c9a85b34563149
SHA256ba78de7510041b2c1191647a48cee152825fb6771ba9c96a5eec64dd30c3d27d
SHA512119229ce71e76653b18cca0067cbf39387d3c45cf64e8d68c99c9af62bcc5e8161f8ad8f2f902159892e96158d3306697805d234e42dd38e4808dae725878a1f
-
Filesize
10KB
MD5cc764ca03289344ff9c9bf2501a0fb5d
SHA17479a812ccc4df9b535f8b9d75d6c03ad1e490ff
SHA25687e30156bc2f3181cf11462158b99cf241b8e8330f58d111f75cf3799985af23
SHA51251d9b449942626bae2370407f137bcc59be529f251af9015e4d91b19673211c9fdbd4774771cbccedc6407ed0a78524fabd9ee691f7564483c7dab0254c8f46e