Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 12:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://simplificateconbna.tuonboarding.com/landing_next?tokenLegajo=66730a8994538b002bb3d35c
Resource
win10v2004-20240611-en
General
-
Target
https://simplificateconbna.tuonboarding.com/landing_next?tokenLegajo=66730a8994538b002bb3d35c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2400 msedge.exe 2400 msedge.exe 1512 identity_helper.exe 1512 identity_helper.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 3312 2400 msedge.exe 82 PID 2400 wrote to memory of 3312 2400 msedge.exe 82 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 244 2400 msedge.exe 83 PID 2400 wrote to memory of 2180 2400 msedge.exe 84 PID 2400 wrote to memory of 2180 2400 msedge.exe 84 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85 PID 2400 wrote to memory of 4868 2400 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://simplificateconbna.tuonboarding.com/landing_next?tokenLegajo=66730a8994538b002bb3d35c1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93d6e46f8,0x7ff93d6e4708,0x7ff93d6e47182⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,5559830620732205399,12179086668102312471,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5e5868f6a59dc3cd458c222dbe7672cd4
SHA19c9c0b5300f5b3f190d9c8bbda2fd5db1675e7fd
SHA2565711240220b809e809d71426bad732fe754301d85498ce71e5a9121f50fd4b94
SHA5123501aec0e9b76ac0801328e27c6c7e31193db1f75f22833b2ec6be129cc04452602f4c6a6e9f4b9f8f243691050300b0a58dd8f41da326adfed56423eaaeff6a
-
Filesize
2KB
MD5699b85da0effe85e23c5fa44feda0504
SHA16bd50bcc336b9d3efcea85d094e2e0260e939f5a
SHA25690256af9a497ee86ccf3c29fcfe684ccf2c91fbb551f32556f3896a7ab43c835
SHA5128a6537d458ac87c23f76d57dea5768d494aa4fcf58fc7662563a659af8d9789fab17a79b4d8b1fdf29c1f480a924838bb6eeda9c0bab0c4a9998cd22a9c0874c
-
Filesize
5KB
MD5582cd7859aa6a4cfe49b9a471c091586
SHA1765eafcb77b2fbc248783fba846c584cc8b5b071
SHA25678938d918c9cc875d173bfcc69c3f48f6df1cf632632e3514746d464c5714232
SHA51229624b0e72b615c04e21f52b7455ae4c68bb2fe04d6d9fe8f2beb293f7fa608c5bc824414f87fd6711952da1f4d8255316458e8526ace43ebd7693f141c73cd0
-
Filesize
6KB
MD52ab5c0d9785d22bd1471c084fce541a7
SHA1c0a15b766d9d87db1f633391ad887bc0f4e39696
SHA2564c341b83e3e34194e8163cae47ef0ca16c2f3ba870ff8da380dc2d2180c8745d
SHA512f7511545ca606210f89ea99012925835b430c232d6a5c8715a10fe9ae40b4304db1a1cf650b125b7fa4d7e1e8d955a9021651543026c6b623f5468946cb584d6
-
Filesize
7KB
MD5748835ec20cf171e8b24d82af59b4e0e
SHA1d49106494db3ddd1cdc72ae599771600bc5a2a7a
SHA256b9ef4ff1dfbcc29d3aaa31d1ee2faa32ff6ee79e2a2ef4231eaf8a9c36902f88
SHA512041ec631a3295bf93bc38b7d22b624b3e93b21940658440f0954aea36645648302cecd067881f0590620a1a40a621b126310e2a149e039cae368985a8076e113
-
Filesize
1KB
MD5350be112dbd5755591df62c44134e393
SHA1137d9957a9aed595ddb99322b788074cf295dc04
SHA2567fb1e54cd24dce14c82bf0716db86628420e09baa3486422c6cf8b55b19cd138
SHA512e6cf54bf4c3287aad141a620bc7c8df66b2db9686e269bc87d5ed4ac20f98119803461c41651014ae0c5fb0406dbfa41f919d329206aa8ffb780ff0f0d640b3c
-
Filesize
371B
MD517a396156e6c9dcc5cb13b842c3c2076
SHA1c9aea3add9423ef328f7c382a5cc6ac8a1f733db
SHA25669ae79e2214b449fa60ea9e79ef6b9db02db3bfdf1717b4742c8f8e4251db892
SHA512a1efc67b2e75ecb2aae846c3c7dab133a7f445340018583051bcbc4b682f817230c4d17a265da599572971cdab88d8b7bcad48b133fc9826b6f569fe84abeb1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f9a7266a-b8d8-4acd-bf4a-3a573df648ff.tmp
Filesize7KB
MD51169bf93a4fa02944cac6dece959b4f0
SHA10df812baa61cb8214439452474fd659a4de5968b
SHA256d0540d164aaff13be16634ad475a243c8840aa3c96e343461805f30bb1edcaf9
SHA512d4f9553e718bf55aeac325012681e01f3ef48cfbc142bb8ef912837c442c0cf544dbee0efca0d3eaa7fca8bf336790c6329cead0d5569f4e780cfb3c6f047f9c
-
Filesize
11KB
MD5c7c6b9b96f87fe062282c78a5390196a
SHA136dc45f52eeb1343b33b4df2c10e32e662a7e90c
SHA2565a046b12a337696c402a5bd3836ea172100d08f190e1bff78062246be2e33ae9
SHA51298a5374d69e9142d1a6fd9f805f0fdf16ca4297ff30fbdb21d062f93161999c66fbbe8163e6af564564a13929f2625191fc4012c720593ddeadf53cfd0d5d1f0