Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 13:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://26cw2che.r.us-east-1.awstrack.me/L0/https:%2F%2Fwebazure.dian.gov.co%2Fcomunicaciones%3FidComunicacion=AWS-47d8cfa5-5a43-14a2-0f26-92f687da35b0/1/0100019331cd4608-15a5a040-ce5d-4221-8f64-348361c10919-000000/P8xgSaJK5Dz-DYBqlWDS0VzMmA4=400
Resource
win10v2004-20241007-en
General
-
Target
https://26cw2che.r.us-east-1.awstrack.me/L0/https:%2F%2Fwebazure.dian.gov.co%2Fcomunicaciones%3FidComunicacion=AWS-47d8cfa5-5a43-14a2-0f26-92f687da35b0/1/0100019331cd4608-15a5a040-ce5d-4221-8f64-348361c10919-000000/P8xgSaJK5Dz-DYBqlWDS0VzMmA4=400
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3264 msedge.exe 3264 msedge.exe 2368 msedge.exe 2368 msedge.exe 2176 identity_helper.exe 2176 identity_helper.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2368 wrote to memory of 2604 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2604 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2736 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 3264 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 3264 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe PID 2368 wrote to memory of 2580 2368 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://26cw2che.r.us-east-1.awstrack.me/L0/https:%2F%2Fwebazure.dian.gov.co%2Fcomunicaciones%3FidComunicacion=AWS-47d8cfa5-5a43-14a2-0f26-92f687da35b0/1/0100019331cd4608-15a5a040-ce5d-4221-8f64-348361c10919-000000/P8xgSaJK5Dz-DYBqlWDS0VzMmA4=4001⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0c6c46f8,0x7ffd0c6c4708,0x7ffd0c6c47182⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11611789363671313294,5061907709413756186,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD59aecc57f1f90439b0d707ee492aec02e
SHA1b2ade492fb514acc773bca47031dbe7d3e5d52d8
SHA2563d865412188a8449dd8d5d37d340664dc19e9053d66db5d6443942e65fb0ebd1
SHA51205d18281dbd8a85d2f414f72f8cb692ca74d8d29dd4003706bf0ca2761176a6bee3e1bcfa657ceabd8a99b9c22c0722f4968569356c7b930996ad93a7e88cb17
-
Filesize
583B
MD5fd0a73bbbeb0dac61a92b8c9b4383813
SHA1bbc459b3552d27f8ac9099f8229763febc180790
SHA2569a8e7ad5d939b5f9da1cfa23c43158bf4e786370b68f0a0ae05be0a2967ee487
SHA5128dfe38505eb22a36003714234fd4fb4f63c069ac8c1e14df371e851b8a00ebf557a13854364e25c490a9b1f257d7cc15a44d9053bce64051d2b941da7ed59d2e
-
Filesize
6KB
MD521f32956a8d5a3522fd0b7c78f9a9c90
SHA1815dec35df544fac259cff76fe05aede659f5090
SHA25630ba036b64af1363c449a78eb9a2467360aabdfcdaa9295813b24a36603e2ac0
SHA5121c2e7f69f59c0c6005a3af69be5db030ed322d9c794f784b04b46a9da728aab9d57ed27bd5e00ac04a9937bbe6c3047d8176f635eba48009d8e269d45d696683
-
Filesize
5KB
MD55aabd465dfa065a3febbc100e42042a4
SHA1ca473a9c6e53ad78930c224bee4bd795bc69656f
SHA256d8ccb7e77c157f21762987a658fb61556b1af7f01344da4f3804a11e2c475f5f
SHA5122158fa71c11d2a1198c1c26614c26002566abe8840be2f78d874dd3e0bbfacb5ed4fdf43c27ce300b144430e7b9bcb14f06c6264a2a15acaff5b123390231a10
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5af20320b1ea0320be62a650e3fef891d
SHA13fa6e30edfa04a90cb6862b10a6db12c259bdd18
SHA256b692954076b06502c12131904d6a1f4d23ac30fba267f14c1e5891214bde8a97
SHA512cf4dbd1b856f986215b613d912c3373919bae9d449ac572bad49278db71917f1fa8f1c8f9401ca693ec469378c7653ed2f10a7413e6d8b7f728a03ca550c1f3a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e