Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 07:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://docu-voltfficepaperworks.dragongeekstorecomics.cl
Resource
win10v2004-20240704-en
General
-
Target
http://docu-voltfficepaperworks.dragongeekstorecomics.cl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 4924 msedge.exe 4924 msedge.exe 3812 identity_helper.exe 3812 identity_helper.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 4868 4924 msedge.exe 82 PID 4924 wrote to memory of 4868 4924 msedge.exe 82 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3580 4924 msedge.exe 84 PID 4924 wrote to memory of 3612 4924 msedge.exe 85 PID 4924 wrote to memory of 3612 4924 msedge.exe 85 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86 PID 4924 wrote to memory of 3472 4924 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://docu-voltfficepaperworks.dragongeekstorecomics.cl1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbb6a46f8,0x7ffbbb6a4708,0x7ffbbb6a47182⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,3595806339567420144,2394180215958513474,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f0f818d52a59eb6cf9c4dd2a1c844df9
SHA126afc4b28c0287274624690bd5bd4786cfe11d16
SHA25658c0beea55fecbeded2d2c593473149214df818be1e4e4a28c97171dc8179d61
SHA5127e8a1d3a6c8c9b0f1ac497e509e9edbe9e121df1df0147ce4421b8cf526ad238bd146868e177f9ce02e2d8f99cf7bb9ce7db4a582d487bbc921945211a977509
-
Filesize
152B
MD50331fa75ac7846bafcf885ea76d47447
SHA15a141ffda430e091153fefc4aa36317422ba28ae
SHA25664b4b2e791644fc04f164ecd13b8b9a3e62669896fb7907bf0a072bbeebaf74a
SHA512f8b960d38d73cf29ce17ea409ef6830cae99d7deafaf2ff59f8347120d81925ff16e38faaa0f7f4c39936472d05d1d131df2a8a383351f138c38afb21c1a60e2
-
Filesize
6KB
MD5e863fca24fb0320b7fa403107b8d5d36
SHA1f1600a58abff45936fb8831e122a87239be80678
SHA256b93ea0f0d65b89d2f5bd0de2a9bd1bbd1db91f0493277747b6aa41654aed507d
SHA51269b72b49de5f8f4e4b4467b8d93e9bd3c52e8aebda0b364c18dad762e5af302122f4883156a0d570346cad03aa027332d0e7102d38c7f5351d8a9d4fc5e1deb7
-
Filesize
6KB
MD574c40b5cd785606811ed36ddae020056
SHA14081df1e9db343d409f204293fb76504d31e8831
SHA2562b60035c6e1f4ff63d68d7460fe00a6e3f4e3f657387b147f9f9cce9a23cc3ae
SHA512bfed2860e198f2eec056fdb1f0bbf44d7d6cfba9904a84dcbd6c8965eb0d13064d0f9a67a5db0a492b996ca7d1a20c818772924094553de5ce4b31a2286439e9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD595eace71e90a65f94721b9623c248bae
SHA1524a49ae446704b35466f19c45ebc757da3bd6dd
SHA2561008b0a862162d3a828b082adfa5167327bfde2d09f3ab262151332c43506970
SHA512bc1b5d67b24b8c6f9e60b7055d3a38d9faa31ed6b69f95a09541b00f810fad60cc99b9fad93cbdec1bf96b4b4460368e1490535d3ce0e735854d5b9bdafc94fe