Analysis
-
max time kernel
1767s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 00:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.bancodecorrientes.com.ar/
Resource
win10v2004-20240426-en
General
-
Target
https://www.bancodecorrientes.com.ar/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 1728 msedge.exe 1728 msedge.exe 3212 identity_helper.exe 3212 identity_helper.exe 5516 msedge.exe 5516 msedge.exe 5516 msedge.exe 5516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 5064 1728 msedge.exe 82 PID 1728 wrote to memory of 5064 1728 msedge.exe 82 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 4232 1728 msedge.exe 83 PID 1728 wrote to memory of 2004 1728 msedge.exe 84 PID 1728 wrote to memory of 2004 1728 msedge.exe 84 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85 PID 1728 wrote to memory of 1200 1728 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.bancodecorrientes.com.ar/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1e8a46f8,0x7fff1e8a4708,0x7fff1e8a47182⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18198432143304301632,9058313387849836716,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\805ed9f2-bf76-4ffd-8092-b6b682da45ed.tmp
Filesize7KB
MD55bd85a16a7a561664bcdb8c6233dbbee
SHA17bcc2426e97ebbc0e503b9c5b09f75b1cab1f6ed
SHA256124c20b37b5345996f74157c65975d52b0f6efa5847735fc470276c59128ead0
SHA512272de51ccbcd982c4ee4c4e81bcc66c1b9e52ce3e5895401e44a5c7604ad996afef9fe841a6bc28422f6b1e471964b97cd05ddfe78de656757646b16621935f9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD524524935d51b0ee8d99c52f8176a0472
SHA16865d2687eaa784f48cfc034531833e3723bd2ba
SHA2561f372d487f545b63edd4bed5a331cb8669afbc9b6c099e98e9575fc899229460
SHA51263279e301734f9788fdcbd4533da0ecb98356d908896880f77d51d3319a30fb1cb692ef558f2c07b204123e5018f06ab54e305f9c4c761c5da8a500fabd0ef12
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD5654611cd19eabd75a78d391ffa23e645
SHA1e530ba7975caa26d85367c5a48ab6dcf424fc54e
SHA2563cfe56110ca962a1fc077840f147d708b79efcfc8bd8a0c48ddba1ce4ac22c1e
SHA512607c60018cb6236b1682827ebcf88a308cd38d9c6175e4accb260cbeefca6f95f595d2d87e3e50f61750148439e8adb55833353a8f8e94e7d510ecf263df2bf4
-
Filesize
5KB
MD5affe209f0066142a166c6c191444002b
SHA1b704215a800b1f2539c204a64f25e59204f621b9
SHA25617b4fc625b45ec80e91f197e90a6fbd6295cf80653a9010a7e640f274c3f4ad6
SHA51220a7f570e35830f859cecf93b808a6ae9f32b37c2849c0d9975f168e8a8111596036691fc792ff78427904781f6be31ba905678afcdcf7404c80e0ab23fb68f8
-
Filesize
7KB
MD54bb58b7506b3f867bda99306a11399b3
SHA1f4fff2feee03c7e53d51d5bcf0a072052287cecb
SHA256cafa5c3c8c0c3707401a33adc1a0953db56538edae4c33c47bb9b0bb13086819
SHA51285e00283508362176670e9a7ecd36795394fa3e1f49cf218e396f1cd1b7d78945318d27dc5e72b2e68bc7063f06d8ee2965d71a1dc7034a286a93f3c30e8e7e1
-
Filesize
1KB
MD5a87280d7ec42364c0f334d4176bffcac
SHA12732e9f471d2584c9f1efe23dd623e6a33e21117
SHA2564d87f0c4714349f1d6a0200b42036afb459033ae3839f34d79cd13f8c2c08616
SHA5121a67eef0e7c83f7787bc45f007dffa5c9bacd43980416e14b1dd7739435b7accef8196aff7a9aeaad3d006bdfddab1d3daec03486705c9b0b06e1f83fb08195c
-
Filesize
1KB
MD55ce18ace0b663472d6a6890dc1f756fc
SHA1f89d375c0dc239fcb57161d32155eee7021590e2
SHA256580ebcb7c9731c99054fc3c6d9d8a0c86dc633baed6e2d860970b81114a91774
SHA512fd5c1c36bda260427e51bf414831fbb02e30dc141af908163ef9f302baf9002e3627e4f80098997080abe8c1ee6abf1d759f45e7964e68ce77573249ddcd58ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5652aad769e436c2e8c96c49ac5da503e
SHA1acae8723710293154e51dee5318792a987a42c57
SHA256791083141c31e7ce7552b3dff9000e894eb053ea1b023bf5daacbfff433038ad
SHA512a2148c8b12296d8f4cd02ee5cc6a89659a616e44807ebfdbe8953e5ddf48dbcb4b2f159f84ec3caa757ccda2d10f5b0e256759974b665c136863bd59b7573197