Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 12:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://elsur.com.mx
Resource
win10v2004-20241007-en
General
-
Target
https://elsur.com.mx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 1080 msedge.exe 1080 msedge.exe 2980 identity_helper.exe 2980 identity_helper.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 1820 1080 msedge.exe 83 PID 1080 wrote to memory of 1820 1080 msedge.exe 83 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 4124 1080 msedge.exe 85 PID 1080 wrote to memory of 5100 1080 msedge.exe 86 PID 1080 wrote to memory of 5100 1080 msedge.exe 86 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87 PID 1080 wrote to memory of 4212 1080 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://elsur.com.mx1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde21a46f8,0x7ffde21a4708,0x7ffde21a47182⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7320840940239917376,15866390502807005749,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
41KB
MD5503766d5e5838b4fcadf8c3f72e43605
SHA16c8b2fa17150d77929b7dc183d8363f12ff81f59
SHA256c53b8a39416067f4d70c21be02ca9c84724b1c525d34e7910482b64d8e301cf9
SHA5125ead599ae1410a5c0e09ee73d0fdf8e8a75864ab6ce12f0777b2938fd54df62993767249f5121af97aa629d8f7c5eae182214b6f67117476e1e2b9a72f34e0b4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD529330a684fe133b50101a70607b78ca5
SHA1568762e38484da7e2189ef88947429724ba5426f
SHA2564c369a3b424478cb588078c1f6685358b2fbe1ae512774541684981701e7d5ba
SHA512da294b4fbc2c8e1769a0828c6121f32db03b8a420a8766b8b5b7818e462f301daa4152b2ac8e154bf638b757ca182f8ce5550f101ce7a0bd0649dd5f543ff090
-
Filesize
1KB
MD542ef2654530c02ee0a9668f291aa2ae2
SHA1b4c91f02bacdf879b4e8a6b5b8433ba14a00ef8a
SHA256b5fbdfea8110b3bc27e62338cd8c5034899f1b360b4bb372fd8b69c8a4736d46
SHA5126c9b4cfa7ac9567f4e1c7c5e83dfb768955fa8a0413eaf96c50f6cbfc2ff49a9dbda1f8fc23c2d44275a395c0ab1e83c72f45b399897c469aaba560e202d8690
-
Filesize
7KB
MD57ad6b8668c5787824e534b64f819c8f3
SHA15ece054e0631449c60d24bdf8c80d71bf91a69da
SHA2569ce1c7111b171553780bcc7db2c283c5484882f3a9df8061d936326b00913aa2
SHA5125dfbb2829bbb6162d24e42690e71c8a331297662f932ff9771590e2aac874544f91aba830a96ae4d4929bbcf35e1913933d0063d008a89bc8f2cea713661c799
-
Filesize
5KB
MD5b18952ec6bdd1f1208c2158d5b93f1f7
SHA1d36d2c02d32198efebcac40d88d34f7bfbcff150
SHA2567dd4f7befc5ba5aa9b79382be9f3078e0090853d4874300e005f5aa9636d85a5
SHA512f56ba77b9d2c7110a98212d6353a767e0e53ba13cd2913db52585864b74048e0f3b6fcb9d6adbb8290bb8ab1a12928c636db27d895127debc597178206823c39
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56f3724a45240ecd72561dfce7098f739
SHA13ce6187227972078344f29ab01515b3639048b94
SHA25670cadee50f36060bd705750d381b3d9ac41789c8a1fd6aa7322404cb3076f4db
SHA512e58ee2fd751b238841d4fe0c2028c10bc347edb2f41922027bafa54d28203ea006fc171433a55008ad2cec30040652ff60b1fc5a90230ce6e772f7a7e9c1b812