Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
900371791; INGENNOVA S A S; PRÓXIMO A ABRIRSE COBRO JURÍDICO POR INCUMPLIMIENTO DE PAGOS DE FACTUR.eml
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
900371791; INGENNOVA S A S; PRÓXIMO A ABRIRSE COBRO JURÍDICO POR INCUMPLIMIENTO DE PAGOS DE FACTUR.eml
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
email-html-2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win10v2004-20240802-en
General
-
Target
email-html-2.html
-
Size
18KB
-
MD5
36b5c3c048e7d9ec00230939b2e34a58
-
SHA1
4caac3155e96da7814190e33c4d1aafdd84b582b
-
SHA256
0ca5b9e51127adb629b7a5a8935cee927a07e717d94ad4fd7ea09163db916c41
-
SHA512
1095ae41c5b2ccb102d0daee4449e629cdf493707293162e5c1b75aa9681d3c509497bfa0be815e2e75ca8f87d2c1b1c79a4f25c617f1538924f0826a6aaa94d
-
SSDEEP
384:v7BmOTcWTKNr+/SuJ9e+ge+ne+Re+Oe+YWe+J+ebJ8e+JteCK:v7BmOTcWTKduSq9eHeIeIeVebWea+ed3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2764 msedge.exe 2764 msedge.exe 3692 msedge.exe 3692 msedge.exe 2468 identity_helper.exe 2468 identity_helper.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3692 wrote to memory of 1040 3692 msedge.exe 83 PID 3692 wrote to memory of 1040 3692 msedge.exe 83 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 1036 3692 msedge.exe 84 PID 3692 wrote to memory of 2764 3692 msedge.exe 85 PID 3692 wrote to memory of 2764 3692 msedge.exe 85 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86 PID 3692 wrote to memory of 4904 3692 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdeeba46f8,0x7ffdeeba4708,0x7ffdeeba47182⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2824 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8553022227837029502,14751433620592418080,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
614B
MD52e354bf73c5175c84f54340e3cf3a58f
SHA10f170742dd6e31a5e76d17e66bf81303f9eafdd8
SHA256f4e9da664d91fafa2c72925f60a881579e9ff91fb34c4c8791410ab7722b87ad
SHA5129023635be5b6d4ecb6e564862da7a87669ea2afe8419e4ef09c27e4329cdab097f5904a13b57bf628e999df62c3e6e89bfd2f2cb2d4c541881352f50e6e636fc
-
Filesize
5KB
MD563e838164961b5796c201eedc3d400d6
SHA17293ceab9a9d6af563a0f94b4b70b24ece7690fc
SHA256135b219371fca40dedd269397107c9a259f352bccd35c27e5d48173b210ed5c7
SHA51263f73773402b2ab2586b88b07eae7a27a5af9f7dc59eba79ba5bc146e666b2b3420bdd7402b9e8f6531a5925ca4a376826b5f853d89ead53ce93f7c4ce2a670b
-
Filesize
6KB
MD5f5d08d9c2be7f95be8509bec22f5cb8e
SHA151fc8300ebe98180bae85c4408e26f11f95eb5d0
SHA2568659e6e1ef4a8cddb7fb398780fd3d090e57370aa65e8c48538d89fb0925e3fc
SHA512fa35c259a95d695c9298dd7536d74c08492f8c2c5a986d5001ddc1a24a7e4e72232f82513b730d69ae85e0478943738f90c7b80083b56b728b5125d086a2501d
-
Filesize
6KB
MD5394e7ef948d9c342834f639f54a27467
SHA1057b6fd69e31170caa36492a50fbd46324a044b8
SHA256dd27fca17552a7d918eeb3e1be65d5b206423654346736521f2c612dff1dc698
SHA5129bdb64579a3dbbf3e77c020ef59fb883a7eaa9c91619d9fe3dc2bd3dfc2b540ba2de544c3b18040c78c17ffece7a207e51f6f9d5c0e1c50b6938d845820aac62
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD553856459321e0595fbc77e267c1bbf2c
SHA164ff126028efd9ebb8c33f5db605c7a922562f15
SHA2568566020d0e8174093516a7f800267189dda647ac95c568ad4505bbf007777ba7
SHA5125e0c73905f69e41b50235b66d8f89f9ded6f2c7ab621458a78132f3a680cae28505db86cbee927392b20d97c5fbcf5a0e7a7ce74fce363e77b835f0f95ae306b