Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 15:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.galvezestudio.com/
Resource
win10v2004-20240226-en
General
-
Target
https://www.galvezestudio.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3064 msedge.exe 3064 msedge.exe 2644 msedge.exe 2644 msedge.exe 2300 identity_helper.exe 2300 identity_helper.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 640 2644 msedge.exe 86 PID 2644 wrote to memory of 640 2644 msedge.exe 86 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 1784 2644 msedge.exe 87 PID 2644 wrote to memory of 3064 2644 msedge.exe 88 PID 2644 wrote to memory of 3064 2644 msedge.exe 88 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89 PID 2644 wrote to memory of 1568 2644 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.galvezestudio.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7bd646f8,0x7ffd7bd64708,0x7ffd7bd647182⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9536724379606028559,18355807899476758668,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5f77d76d37a4e305f689343c283f03c53
SHA121fac39aca55c9014c74dd9fb555e1fd35e17290
SHA256aa78fb0cef4281e23b8f09cd2791ee8ddb5e5f14ef303e0e6630f981c7385ea4
SHA51279996056185c76272a8b27d2f7a192ead6c92822a5d5dadd9ace0240d2efda3ded62878f27a7104ef973424b71ae3b4f8a81af6daebe1dea0aba93e6491d980e
-
Filesize
584B
MD53d718e9d7d34007283ae654235d47221
SHA102d4858c910f4163f46091625e80a2cadd9d2169
SHA2563baa3d7128de1dec4b344df419e52c594cd649f1b4ca588a5f2fd0b4f79d86fe
SHA512eebfe9468d78ced17a4bea87938e936d2626a1b8d3ccb32524524ac8ed8f22c5832a91fc4bdb6b083cb8bd5ab4db88968da2475a4104e671642d8f06673b9553
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD58a0372d7cdb1525ee16d4253f190090c
SHA162375b624d0685fb165a9bf6654c6af00117e2bc
SHA2560b1beedd242d789d98ffcb54d37d8be6d1e04a2fdb54fdafb11d9df636ab3c2f
SHA512c0e6aba73196b45f5823e7994b270eb6d6e3c55827e1313bb6a179cd17f5211b659a682638d2bfba264b3460f40a1baad8144fdb862777d3aa19a8228f11e8e4
-
Filesize
6KB
MD563ac6bdd27dc1766c6072f507f67326e
SHA1012ab0499ad507328788a8d479c475a678e25ddf
SHA256ca1ed1b95458a744fd4712bd2ac11c1ea797be836ec6917ac6f5fa4b15ef4856
SHA512bd7fc1cf7753ed40192beca0cb178bfeb5005155b7474a56f18747e7cf53449582e85e5f22c2a0212c0ddcf1470ea19f01f9ba3ea1ac1c16857a0662ed3b22f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD509cb2233caa83293e36eb69b82763fa0
SHA181ba7ddec12f059b46ddcdde529e72f5930fb228
SHA256bb92d5e5558f5ec2aae1cd4abe9eea10f946ee725bf460d7b605961531f5c911
SHA51283e9b5d2ca3cce6b0ea326573bdc64a4ed5f663705e7a2bc8847bcc2b2b36a635e7f337c34a5dc66fc920d172607f0e99f6ac286d37479c716300f8c6cfb01ce
-
Filesize
11KB
MD58beb7a7832ca7a26f1840b2ca76224ef
SHA1df6261f368677a44aa525204d4ebb9f13f9e3599
SHA256c0fb3b635ae0c054bf662436bacb4174e0e57a1246b71e0857cb40887cae5564
SHA5126779533a6eac36feab735f681a09f5d7d1e3132998ed14fdd64abad72acbc3bc81be86ef0d4a76278604b396a25314948341754141880eda356abfb9f2e7289b