Analysis
-
max time kernel
70s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 14:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.radios-argentinas.org
Resource
win10v2004-20240802-en
General
-
Target
http://www.radios-argentinas.org
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 1276 msedge.exe 1276 msedge.exe 4316 identity_helper.exe 4316 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3132 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3132 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2732 1276 msedge.exe 83 PID 1276 wrote to memory of 2732 1276 msedge.exe 83 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 4176 1276 msedge.exe 84 PID 1276 wrote to memory of 3636 1276 msedge.exe 85 PID 1276 wrote to memory of 3636 1276 msedge.exe 85 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86 PID 1276 wrote to memory of 4880 1276 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.radios-argentinas.org1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff540d46f8,0x7fff540d4708,0x7fff540d47182⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4444 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4148 /prefetch:82⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,6448625973134144072,14489820690115794118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:976
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x5041⤵
- Suspicious use of AdjustPrivilegeToken
PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD55b517fbfd0cae4d3f6184160130a9aaf
SHA1448cbd0dcae6e853946864397434302cf36e26be
SHA256b880c947acf2380cca89d241fa9ba4a99fb320c81c59727049e1b038d119a803
SHA512caf8d9f5f24b7ea972abbca77788bf4f1c5f57d05d81aeff08e4531f89f4e2c09915e49a76a9971f4920ba9602f1aea433c24d9ef278f4c5057842fae8d0baa6
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5c83c9202234d58f35a4dfce0b244660d
SHA12ffda51f931083ddf1346484dc8a2a980e0d62e7
SHA256b9fa1ec1d67bc3944ab1b963b986b83c2e01c924a5f64f4fe49bae52225f22a7
SHA51270ba1a0cb5e6fb23d1ce51b7691960714b0387c1914cd726a10c4057d929cc36c119d212b7c0cf8c1cfad973bea620fde219074b0d12c3275af5923f31addef0
-
Filesize
5KB
MD5d5c2b8544cfa89bfc067b112163d14bd
SHA16d21551ea7b1bb0babc8ce3022c5ba65b7440fc8
SHA256bdc86a6dc0adc1d486670f20ada00e1490bcab7e1dd2894e08487ff011677e23
SHA512d1764ad2b897b8fda224ea1152ffb921229380e835ee4776b83f9ea8ac83861b5dabece6bf628cc34e00a16ce66efd29eb5a6c42624b9bfc34ed1cb252173642
-
Filesize
7KB
MD51bbaa57d7c19fbd821c38ad930aae0e5
SHA177dfd4c4b821692ac43868da212298d6850c35f8
SHA256dc8d2b7cbd446ef99546eeb012dfbc29634fa0f92694d03ac4de81ab4c1ec50c
SHA5129a631d5184a895f91ead919eabe826c5d9e2e5f167259f032700b1fbe23f37821f6971bb4a2dbfa2d87409be7e90f31bb054965f5aee29c36b15ed5d4897ce54
-
Filesize
1KB
MD539e412d3345b91041d9fc17cac75bc5e
SHA1a4b04a1eb678f87075d7c48fddaa93a6b98ac054
SHA2567b71b06665249d7c8228327a0ef6e82c8c67c848618d1149bb4cbcd3f982d21d
SHA5129d75c720ad00f20604aff7cc234b6b3a8ab22ec6333e849b6c9e72bb60df809784abe97d19d063c3b97d4827f0126b96893e47cc007a540e2a987556e831a56b
-
Filesize
1KB
MD5de97f73ab2075a36fd0ae83a57ff0b82
SHA1ebc3fab02fb6c857cfc885ba93aada2cdf9a52e6
SHA25628ba1a47b5f3cca8c059a1e1c0e382294e8b039d9dca83672abd639078a4c1e0
SHA512b71ecdced029809c32fc029d0388350d6e6caafc822cf26ffd81ec1e51948876bc940bac5086fcba99dd875ae0c3391a94299f2f3171e91e9e04ce4a9242eeb1
-
Filesize
1KB
MD5882dbb18bfc4e84caf909af18151e54c
SHA15f51ed3fba67c7262dde3820b57ebabee485a46b
SHA2560dddc714fdc78d21c4f201d30115c8a4df3310a2d95f11307986acf7d90357e9
SHA512f99752c6087b29b1fbba5b97c09e735ee8207cf7be649c81ec47ab6f6b7cb32369e080d4a5ae8b99e894c893c6eab844013b5bc3b2b0f12d08eacf616ed7a48c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5d5acbaa34556257f613f571f0b6eb9eb
SHA19352fa8be5f873a423ca5a8bf4875bf30f33c9c8
SHA2566f8f4c19ba7657be3bcfaf0946885e250e3394bb6f9a16ac914a79ad32c55b0b
SHA512b3d61d0ada26948a7f1f98ecd75b2e06cf71758b0171c5e5878cea09afdc93f864e2b8e9b20afefe4204f1e352ac0ea64e29702e040a7f38ca8f7518eecaacd8