Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 21:57
Behavioral task
behavioral1
Sample
Factura Electrónica. NWM9709244W4 - IXAJQ7884 (696283) (77.3 KB).msg
Resource
win10v2004-20220901-en
Behavioral task
behavioral2
Sample
WALM_ODM950324V2A_2021070200133021000011.pdf
Resource
win10v2004-20220901-en
General
-
Target
Factura Electrónica. NWM9709244W4 - IXAJQ7884 (696283) (77.3 KB).msg
-
Size
119KB
-
MD5
955aadac15cce2817ece1821bde136ce
-
SHA1
75e234a74d0b9474e11ff5b5ac95a2cbdfb37d3d
-
SHA256
7d49bee6860258ba297bbbb27bdf5cf1f499fb4dd9357e1cbc5ef1035ec53aea
-
SHA512
18ba94a36df4c079431c89141236fc4627b33479c05f462fff5da2041ea953c65e60c3ad9d94c00d1673737869ffc3138ff6e169718d35f5f733c09e17d2d2ef
-
SSDEEP
1536:emMN/cpT/q6z4oIdtzpYC59rSqUNWOjK4XLtfSTn8DGfHsf9gf5JpcQg86Ay7Q7B:ekzC59194xkn80Mf9g6NAy79Bi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\.msg OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\msg_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\msg_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\msg_auto_file\shell\Read\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\msg_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\msg_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\.msg\ = "msg_auto_file" OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1480 OpenWith.exe -
Suspicious use of SetWindowsHookEx 37 IoCs
pid Process 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 3120 AcroRd32.exe 3120 AcroRd32.exe 3120 AcroRd32.exe 3120 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1480 wrote to memory of 3120 1480 OpenWith.exe 95 PID 1480 wrote to memory of 3120 1480 OpenWith.exe 95 PID 1480 wrote to memory of 3120 1480 OpenWith.exe 95 PID 3120 wrote to memory of 3676 3120 AcroRd32.exe 98 PID 3120 wrote to memory of 3676 3120 AcroRd32.exe 98 PID 3120 wrote to memory of 3676 3120 AcroRd32.exe 98 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3320 3676 RdrCEF.exe 99 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100 PID 3676 wrote to memory of 3620 3676 RdrCEF.exe 100
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Factura Electrónica. NWM9709244W4 - IXAJQ7884 (696283) (77.3 KB).msg"1⤵
- Modifies registry class
PID:652
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Factura Electrónica. NWM9709244W4 - IXAJQ7884 (696283) (77.3 KB).msg"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C38C6952C7D8CBF2C15051BE3C58A080 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3320
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CE880B80F3B93F027328CE413430AA5A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CE880B80F3B93F027328CE413430AA5A --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:14⤵PID:3620
-
-
-