Analysis
-
max time kernel
63s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-es -
resource tags
arch:x64arch:x86image:win10v2004-20240412-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
18/04/2024, 06:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://webinfo.rittal.com/e3t/Ctc/2I+113/cj-sD04/VWbtpD30XZ7WW2fLbjR8QMpscW7Y8zfc5d1nVZN4313JR3qgyTW8wLKSR6lZ3kQVsJ31F4XRg19W692JWP4RxgHmW59RXqJ3K-w0xW87M70B5ZsxD1N3rqkBfLCMlPW7jY3MV6TN7hRW2-NLQ_3tbFnVW3SZ5hm6qzF_HW7Xx5mk2pY3MjW8St29J72mtjNW8qSswx78PLxGW1qYfnP9gzVcSW3QxBTP3Dp7yPW4LPLyd4_lsp-N3dCbcs5gBH1W8gVXd22dXGG1W7L22DD70jzXwVFw9wH4Znf1rW10QywS2ndBL_N2TlW-JV889tW2nYC-b4ZtW4cW3Wwmzl4l1jdDW2RRFn87VBtJ7W2T55Yg4WMV5kVxQ5H82gQ7RhW8-4bsb6-wRY2W6DMKc68Q70zhW6QyTFx5dhYx0f8m_DJK04
Resource
win10v2004-20240412-es
General
-
Target
https://webinfo.rittal.com/e3t/Ctc/2I+113/cj-sD04/VWbtpD30XZ7WW2fLbjR8QMpscW7Y8zfc5d1nVZN4313JR3qgyTW8wLKSR6lZ3kQVsJ31F4XRg19W692JWP4RxgHmW59RXqJ3K-w0xW87M70B5ZsxD1N3rqkBfLCMlPW7jY3MV6TN7hRW2-NLQ_3tbFnVW3SZ5hm6qzF_HW7Xx5mk2pY3MjW8St29J72mtjNW8qSswx78PLxGW1qYfnP9gzVcSW3QxBTP3Dp7yPW4LPLyd4_lsp-N3dCbcs5gBH1W8gVXd22dXGG1W7L22DD70jzXwVFw9wH4Znf1rW10QywS2ndBL_N2TlW-JV889tW2nYC-b4ZtW4cW3Wwmzl4l1jdDW2RRFn87VBtJ7W2T55Yg4WMV5kVxQ5H82gQ7RhW8-4bsb6-wRY2W6DMKc68Q70zhW6QyTFx5dhYx0f8m_DJK04
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1152 msedge.exe 1152 msedge.exe 4264 msedge.exe 4264 msedge.exe 2936 identity_helper.exe 2936 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4264 wrote to memory of 208 4264 msedge.exe 83 PID 4264 wrote to memory of 208 4264 msedge.exe 83 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 2548 4264 msedge.exe 84 PID 4264 wrote to memory of 1152 4264 msedge.exe 85 PID 4264 wrote to memory of 1152 4264 msedge.exe 85 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86 PID 4264 wrote to memory of 2032 4264 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://webinfo.rittal.com/e3t/Ctc/2I+113/cj-sD04/VWbtpD30XZ7WW2fLbjR8QMpscW7Y8zfc5d1nVZN4313JR3qgyTW8wLKSR6lZ3kQVsJ31F4XRg19W692JWP4RxgHmW59RXqJ3K-w0xW87M70B5ZsxD1N3rqkBfLCMlPW7jY3MV6TN7hRW2-NLQ_3tbFnVW3SZ5hm6qzF_HW7Xx5mk2pY3MjW8St29J72mtjNW8qSswx78PLxGW1qYfnP9gzVcSW3QxBTP3Dp7yPW4LPLyd4_lsp-N3dCbcs5gBH1W8gVXd22dXGG1W7L22DD70jzXwVFw9wH4Znf1rW10QywS2ndBL_N2TlW-JV889tW2nYC-b4ZtW4cW3Wwmzl4l1jdDW2RRFn87VBtJ7W2T55Yg4WMV5kVxQ5H82gQ7RhW8-4bsb6-wRY2W6DMKc68Q70zhW6QyTFx5dhYx0f8m_DJK041⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c26946f8,0x7ff9c2694708,0x7ff9c26947182⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=2520 /prefetch:82⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9520885774387261527,6661990337469851213,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:4832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5f5c02a360e9e0de80ff61274fb0b6a9d
SHA1afe6991f17b7955550d355b238b7376fc9afb9c6
SHA2567b81928f1cb52f13bee5d60a61da5bb18129865fc4b290d05b69fa2446c7e304
SHA5125b817ee5e706defb09fcc8071cc876d981c0c314ec4e5480c71112935eb0ff98246a48f404620189bfe7ded62e6d05482bb944000acfc3d61dbbfe28de75aa1c
-
Filesize
6KB
MD565289101d6f0b0995a25e629c7f42249
SHA15211717bfb01f293a0cc3225cc47d046d34cfcc5
SHA256082b50fa0594f54e6fda87f435842d31c7c4cbf5b9ee29df54281b1990cc21e6
SHA512d9482fbd0639ac788bb293d29ff397f97515a2567b264ea9dc2c955411ec0bf047412dea3cad1c0ec85fd6dbf839274c2bf065682ac0f683a0a927bd0e154d9a
-
Filesize
6KB
MD5f9973b94155d484cf634dad5ec062067
SHA12ef72e236f05e2caffa5b8224e171f97f4ae5722
SHA256347e7f8bb3a39573a35bf01ff0156978f78532408c22f64826e20f9c8a815bb9
SHA51216a8e111383e0133dd5a015d81d051b89179f16daead8731b28880e67ee9ac9eadbc1d20d9445542fe2fd95056c0da95bdf1b2055797ca1a80227cb0baccd033
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD52bf7318adfaa79802dfec16b03ac5a16
SHA13b3157b297751168abc7a4d32cece68825e77b4d
SHA256a85211956a4981ec10cba36ffc2907f061086d6e98c943f1dff4e80077a63589
SHA512cc1f11fd37ea94b942d111bcdc9d9bffbc8e1eec0f370f96bdf384b80c0d5ead90df27244ee2c826d1b943b75044d6e19942379bc7dd3a1047b272b0912371ca