Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 20:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/uc?export=download&id=1-2JRN5sDp8g8FsY2l_IYJ8EdgUN2Aaie
Resource
win10v2004-20240802-en
General
-
Target
https://docs.google.com/uc?export=download&id=1-2JRN5sDp8g8FsY2l_IYJ8EdgUN2Aaie
Malware Config
Extracted
remcos
ENFOCADOE
agosto21.con-ip.com:7775
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-7BZCZN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 764 1162OfxSentent1aTutelaRadicado2024-00119.exe 1124 1162OfxSentent1aTutelaRadicado2024-00119.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Webex = "C:\\Users\\Admin\\Pictures\\Webex\\WebexMeetingClient.exe耀" 1162OfxSentent1aTutelaRadicado2024-00119.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1162OfxSentent1aTutelaRadicado2024-00119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1162OfxSentent1aTutelaRadicado2024-00119.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_CLASSES\7-ZIP.7Z\SHELL\OPEN\COMMAND 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.7z\shell 7zFM.exe Key deleted \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.tar\shell 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.gz\ = "gz Archive" 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.tgz\DefaultIcon\ = "C:\\Program Files\\7-Zip\\7z.dll,14" 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.lzh\shell 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.lha 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.rpm\shell\open\ 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.7z\shell\open\command\ = "\"C:\\Program Files\\7-Zip\\7zFM.exe\" \"%1\"" 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.xz\DefaultIcon 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.txz\shell 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.gz\ = "7-Zip.gz" 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.taz\shell\open 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.zip\ = "7-Zip.zip" 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.001\ = "001 Archive" 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.tpz\shell\open\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.lha\shell 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.iso\shell 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.tbz2\shell\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.arj 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.iso\shell\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.bz2 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.tbz\ = "7-Zip.tbz" 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.gzip 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.lha\shell\open\command 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.deb\shell\open 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.rar 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.cab\DefaultIcon\ = "C:\\Program Files\\7-Zip\\7z.dll,7" 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.arj\shell 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.arj\shell\open\command 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.lzma\shell\open\command 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.z\ = "7-Zip.z" 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.lha\ = "7-Zip.lha" 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.arj\ = "arj Archive" 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.zip\shell\open\command 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.cpio\shell\open\command 7zFM.exe Key deleted \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.gz\shell\open 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.lzh\shell\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.001\shell\open 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.001\shell\open\command 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.cab\shell\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.cpio 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.bz2 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.tbz2\shell\open\command 7zFM.exe Key deleted \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_CLASSES\7-ZIP.GZ\SHELL\OPEN\COMMAND 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.taz 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.taz\ = "taz Archive" 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.lzh\ = "lzh Archive" 7zFM.exe Key deleted \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.7z 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.7z\DefaultIcon 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.rar\shell\open 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.txz\shell\open\command 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.tar\shell\open\ 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.arj\shell\ 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.rar\ = "7-Zip.rar" 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.tbz2 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.gzip\DefaultIcon\ = "C:\\Program Files\\7-Zip\\7z.dll,14" 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.lzh 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.txz\ = "7-Zip.txz" 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.cpio\shell 7zFM.exe Key deleted \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_CLASSES\7-ZIP.BZIP2\SHELL\OPEN\COMMAND 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.arj\shell\open\ 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.iso\ = "iso Archive" 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\7-Zip.bz2\shell\open\command 7zFM.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 1140 msedge.exe 1140 msedge.exe 2468 identity_helper.exe 2468 identity_helper.exe 3372 msedge.exe 3372 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3716 7zFM.exe 3716 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3716 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 780 7zFM.exe Token: 35 780 7zFM.exe Token: SeRestorePrivilege 3716 7zFM.exe Token: 35 3716 7zFM.exe Token: SeSecurityPrivilege 3716 7zFM.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 3716 7zFM.exe 3716 7zFM.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1124 1162OfxSentent1aTutelaRadicado2024-00119.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 4340 1140 msedge.exe 82 PID 1140 wrote to memory of 4340 1140 msedge.exe 82 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2388 1140 msedge.exe 83 PID 1140 wrote to memory of 2316 1140 msedge.exe 84 PID 1140 wrote to memory of 2316 1140 msedge.exe 84 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85 PID 1140 wrote to memory of 4840 1140 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://docs.google.com/uc?export=download&id=1-2JRN5sDp8g8FsY2l_IYJ8EdgUN2Aaie1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff51c846f8,0x7fff51c84708,0x7fff51c847182⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2476 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1512,5350243831567249885,13056227161750645931,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6200 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4080
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:680
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:780
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\1162OfxSentent1aTutelaRadicado2024-00119.tar.gz"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\7zO48EBBF39\1162OfxSentent1aTutelaRadicado2024-00119.exe"C:\Users\Admin\AppData\Local\Temp\7zO48EBBF39\1162OfxSentent1aTutelaRadicado2024-00119.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:764 -
C:\Users\Admin\AppData\Local\Temp\7zO48EBBF39\1162OfxSentent1aTutelaRadicado2024-00119.exe"C:\Users\Admin\AppData\Local\Temp\7zO48EBBF39\1162OfxSentent1aTutelaRadicado2024-00119.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
795B
MD5214c798d8c302358e2d2a209d68f4bc5
SHA194aa1c744e271cc5c10318b76b23ccbc0d3dd6f9
SHA2563a7faa055b6ecf05502d66830194bd574c3a852a01ce6102e686df7cc8441127
SHA51246ea09c1783fd24fcd4e680390671bf76a625c11a5bd3648afa3065c74417dd02eb0ef33df32cbd76c8c45e33517f9cbfef2a22796a7f0365808704ec3754df3
-
Filesize
5KB
MD509ac6d5759568dc22202476802b69051
SHA19d194cb6c0b678cecdca80ddca91c060788f3796
SHA256eb5548b830951082c65f7513f6ddd4a5db78ea1848fdad056cb64aa297d10903
SHA512f372bc47c855c35d75888ec9ae1cca4ad2328328102856bf18910a93f9dc2d0b48c0af4d9e15182b3c405b73d6e36c16580cbbc4bb7e29681e63406bdcb16110
-
Filesize
6KB
MD57f439a2128c2d14c355ba699ed2e6a36
SHA1637b1851d6226bc747b3b8ca3489bec6b9e5b5e1
SHA25637457aab3b8cc340e3fa1b5d41b330136ccb84fc89cd7903926b77d4fdf20ea3
SHA512d20595ec96d7eab076ab8115fc32d8f31e9febf5685d0394ea3e7747c3ddb97ceeb5366182b2b7b05d40b28243cfb8181fdb3b6df790e95a408a1cae3682928b
-
Filesize
6KB
MD5604c7177bd826356dbc2df7e89ccf47d
SHA121d1fe16f79f3936e9cd01229ddb260971685052
SHA25645697cbe3d237f41f0be7efde50dd6cffbb04043233bf40f17dd6d446d4f2693
SHA512573352188ca4ae697b6f77f5f1c19e6d3ac131eeeb84ac6efee3b0fd45688bd0ff22b85893ab4fcd026cf72537dcf4a5484a52a26e979c893bf14743ed707c8a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5806d20d1c0b714f98664c096ef45a68a
SHA168ebce3e422e9630ce512f2b21a8d6ac3fbfc703
SHA25699550c8c6db14a2307d2f96726a5bc94689d3abb1ae6953528fc2537a5e7151d
SHA51224857deb204104aa88ccfbbd7ed60156567c0ce4fe303cc8d48aafae35064eb161688cce42fe4bc6106d021f0338bef7ebe81cdd111b78afef045254b4879055
-
Filesize
10KB
MD59817b39005a1563daf64e41b20997bb5
SHA14ba26b3fcca4702b59b63b88dead0bbc210b18ac
SHA25611474dbf2ad3fbed458063dfe42e26ecda82c7dec356742caaad714b96f0a4c7
SHA5121870a05fefe6871f785d0734799dff4be2e1e3a578aef509c05ed2d9da02ad6b19e32788a32a2fb54c0af936e7539d89a96260ec09904a4ab26aec6fa73d55ae
-
Filesize
3.6MB
MD588b93c9f46399e63c0c713211077d4cd
SHA1b30086dba9cc981226a3e36d593e5bf69a0954b9
SHA2560fe731eac32f92d3da0c90f990e37205a99e374f715902a469524205092bf951
SHA512f5ce76651ccd514b60402937853a569762e799c41d814898b0ffe50efb86ba81fe75a79069d984b9b8fd469363aa5523be03227ea211efbbc57cbd5ffbe93cbf
-
Filesize
1.4MB
MD5ee5886a57444e9763977d94183ea5909
SHA111c961de17fdb2e46779a619735d1e88797b6c11
SHA256a665fd6b1f05594b4316109d92a5f468ffc1bd5974c0137488bbd2cff9fc37ec
SHA5124bd72a19ebe825e5cb1db6db2daa11be5ff98cd93f7a4c56617b29f9e1794a92d5e673675b10958626c59ca425956f663290051c3cc2dfb6b5050f1190383cf0