Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 13:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://banco.bradesco/html/pessoajuridica/net-empresa/index.shtm
Resource
win10v2004-20241007-en
General
-
Target
https://banco.bradesco/html/pessoajuridica/net-empresa/index.shtm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4812 msedge.exe 4812 msedge.exe 4588 msedge.exe 4588 msedge.exe 628 identity_helper.exe 628 identity_helper.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4588 wrote to memory of 1500 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 1500 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 2864 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4812 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4812 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe PID 4588 wrote to memory of 4668 4588 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://banco.bradesco/html/pessoajuridica/net-empresa/index.shtm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd875a46f8,0x7ffd875a4708,0x7ffd875a47182⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10100288383602004519,12133960715899891136,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5a3b91aae64e5ac0e6dbfbccedc4f4f43
SHA1fa563be60370a2939ef1b0d558ed155084a1feb4
SHA25676217287e04598f484a6cd58b61e27c0f7ff0e7bb97df1ff1395401030242e1b
SHA512ab22bc0b67174444c799f4b7b397117c4f012fddb9358e1842ba5319cd48089e6bcd52af6487d9c3317f30acef45b15b95ef831fa6de8dacc502137e1323c02a
-
Filesize
3KB
MD5e67eda283158079f69380c6e7cf33a9e
SHA1789b38a75c62ddae88f6743918f7dbb7a7b5139f
SHA256fb5a1918dc5a363a9f26cc12b1815643fa9ee7760b245cc94fd90c15232af5e7
SHA512f9f2b6f41c3630d35017c8f1812e2c7101f1aa887c387ee466dd2e04f85ec8a603a8ffa9137b78cdc0f7b390423478728a141f5c78118924aa834c08b87f42de
-
Filesize
3KB
MD54bae6e3f46cfdda10dbde50506bd3c0f
SHA14410aebb3add3b0f4d09b795612ffdf8a7ba3d08
SHA256703982324198092305af948c3761afcafa5a3b65e58bbf737a270af0ae4db143
SHA512c73c8d7192c62874be6ff309263620dc7536eed1248ac02aa974119eedb0d1b7ae547246914e29b809f68475a2c003f9bda4a1b36e60227211434c390d5cddc0
-
Filesize
8KB
MD556de41309a51e40ab367595ec40bd9d9
SHA1b7ea3287309c5392467d7d673bcb10243023fab5
SHA25646a24a649ca228b12fe19d3305516b32de779c4992b7e092138deb3b337abcba
SHA5126c45893d2b3d1b32ca2445796a36f80f812e3bf539ba51587919203072ddf48cf0ee843a45fb12dc369cd08b9d9eb1dc285327ccf2dfc0dd7f64c1830f3fd297
-
Filesize
5KB
MD54a75791558be4cbca52594d38c73762f
SHA18562872481fd3d2f57a9b568c277a911dbefdbad
SHA2567070f07b5a0469c79f22066c9a8e7a53e3a79ddd046bd80002a645fb95dd2fd7
SHA5128620d1d48695d152c929b31505765ffc18295a35889c972931e0cd39bcd47632721f6b88bb5d04e2677fa34ca8f4be5a53f83388220d6641eae61a5088612bbe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5f69f2220b94af15a44c7fbfade61b3f7
SHA1a2641af86d356618d4a0b3cf851e42fc5b3bafb1
SHA25668232d21edabe72e994e202b44b6dc11748a034d18e404cbcbe866568cb3ffe3
SHA5120e2e17b4aae4bf5137334d2144ee73e5a94ba0a6ce51033842a1a29d197d64e906b2ad766057c904638cdce3366d3102175ddcdc75c3a68cbd8c5b1445be1117
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ea50.TMP
Filesize48B
MD5dba652f793da974ab5a6bced8f2f2d77
SHA197998365fd3891ede87c7daed67f490462584c10
SHA256c223e4ed7acf64040154da1e7860db2add370deb5e5752a9cadc421cae9434ac
SHA512a703b10bd4bf3feffdcea00b25a3a77b7ebaa27444fd33f8e6a0f4153e70d260720e67d00e3de2a658a6c0f3459cd833cf2e2164550d25296c85b3d5381497a6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58a70dd6b1e88d8468210bbff0e0ddffe
SHA16f7e98d97816caabd2e1093a9eaf9646626005c7
SHA256e5bb504a5ff00118ebe461f0ecaf789980c0fd707c90a14be94e6b9475f9c1ed
SHA51210af13bdccf5d847aa557930e92882c9e448cf900d1b4a3ef27a72f2c735c8fb89f47b8f795401e2ce31d741c192c3e4f6b5e8ff9e4b00043bb01521e747ef8c