Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 14:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/JUZGADOCIVIL/CITACION-DEMANDA/blob/main/01%20PROCESO%20JUDICIAL%20EN%20SU%20CONTRA%20(2).zip
Resource
win10v2004-20240426-en
General
-
Target
https://github.com/JUZGADOCIVIL/CITACION-DEMANDA/blob/main/01%20PROCESO%20JUDICIAL%20EN%20SU%20CONTRA%20(2).zip
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 46 raw.githubusercontent.com 47 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 2644 msedge.exe 2644 msedge.exe 2088 identity_helper.exe 2088 identity_helper.exe 3672 msedge.exe 3672 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3288 2644 msedge.exe 81 PID 2644 wrote to memory of 3288 2644 msedge.exe 81 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 2776 2644 msedge.exe 83 PID 2644 wrote to memory of 1792 2644 msedge.exe 84 PID 2644 wrote to memory of 1792 2644 msedge.exe 84 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85 PID 2644 wrote to memory of 4628 2644 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/JUZGADOCIVIL/CITACION-DEMANDA/blob/main/01%20PROCESO%20JUDICIAL%20EN%20SU%20CONTRA%20(2).zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1ff746f8,0x7ffe1ff74708,0x7ffe1ff747182⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,13821603914643250767,13056415408392226846,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4680
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD54cfddb8a08d811d4a7c2b0eceb0abfcc
SHA17e90fd3a72acbbde4722025f5ca74cd6780fd7a6
SHA25683c34094823a21b326e8324f37b0565dc740b9787ec5c80d03de5d7d1bc1e1df
SHA51295fd1c5c7e6d07e2bc23cb943a2d10ab52aa32763aad66435deaaa1e3c256276044e88d66d113b576d4fbc6aa0e110428f460d79c3295d3e8ce13d05017a9a31
-
Filesize
579B
MD57a81f45d472251741b5bc6f76f32f43f
SHA1253a7dbeb234b1445c2cc09c4db63d7107021cc2
SHA2568e67b42a9bb606b4245679a28a064e210fe82cfd561fb7ceb3c6f9dbcfe114f4
SHA512c5cd04bf14e03e599d60855ab7472b86c2988540c2c358794df1fc0c4fb6bc17b8de1550dd9977411e41cf74b11e45e3dff6959f7d856791894be95eab171119
-
Filesize
5KB
MD5fbc01e4bcf7e3da8b6909cd72692177e
SHA1255ce0fea02e2015828ac344034ed5e1e7131241
SHA25616099e4ac9bb1453946b99d68099627e8a6b5b489bfaabdab1667c0d22ee1d29
SHA512606cda62dff3215a18dbde29c58bd524cb751e0c40ea3dde68768eb413f2ed37e3981227e7c28b6e172d795991d423454e9b1a8b297ab1932921eb918af793ea
-
Filesize
6KB
MD546bab1d615635ef736a165321f0ac3e2
SHA16088b73ececfc372bcd0807604c9490b345c5f19
SHA256582e92c272b20bd11f34145daedd3d8e88e8fa1414715ff76a15b1cb4e56de88
SHA51225b3f3d2d6ef9818e712d16337f9a04d38d4e538a4bf69a41d8809097646c94687e249e36949b4d755bb9c1d270bd332072ed3d3da17136655205c4498bb69cb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50778bfaba0831c99d29e1d651e95eb0f
SHA152123c2fb7d33706018853163742cdc8d2d4f23e
SHA2564c94fc1b9a42535382037c9a5a25e98d3575bb25ff07f0d83923f439cf666d51
SHA512235ee5f853779c99ae8c1dbed1f6de1ae4fe561cf3a1c04238896d93ecd30536821bb237daaf0019601a21af2332babf33e5a1c03b34af53be5b9b1586cfa6d4
-
Filesize
10KB
MD5e03aa652338331515a5e6f3dc0e732a0
SHA1f838e6264373c2cb1f9e46397722dcd3e984bcd5
SHA256eaef9e46dc01e5184c8d5875ad9e1723e96fed9916fd5c2af8f4c409e439f9a6
SHA512bcbebeb9cb2442eed683d6091bf16456b182c04e87aceb2d1927fad9b788c9d31d8cd2b77731d9824883e2a7fc650b5ccb91d030f8f644c37545bc3ada96d296
-
Filesize
7.5MB
MD5e24ebf4dbcc0233ad9bf0ec240956b8d
SHA13854f5fb16bd3d48bc5f7e2a544dac5ff347aef5
SHA2562d2b848aa86e57e02638e4e9beba831303f802225b95d769eaf198fec28308f9
SHA51298377d8faaaf512a86f6053b53e723240f03a7088e41120393193506e534ee34e0005a14fcdb63a32e764114d232bdb4dd19d1ac741074572cccf570cfc32100