Overview
overview
10Static
static
1TRANSACCI�...54.eml
windows7-x64
10TRANSACCI�...54.eml
windows10-2004-x64
3descarga (2).png
windows7-x64
1descarga (2).png
windows10-2004-x64
3email-html-2.html
windows7-x64
3email-html-2.html
windows10-2004-x64
3email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
TRANSACCIÓN FR DE VENTA No FE183454.eml
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TRANSACCIÓN FR DE VENTA No FE183454.eml
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
descarga (2).png
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
descarga (2).png
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
email-html-2.html
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
email-html-2.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
email-plain-1.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
email-plain-1.txt
Resource
win10v2004-20241007-en
General
-
Target
email-html-2.html
-
Size
6KB
-
MD5
7fd755737523f145ae1d1b40c551f5c4
-
SHA1
dfc4d77692039375ec7c9a50097ae8c3b5846be1
-
SHA256
f5ce58aa675123c619c9f2a949969e1ec830212d16cb688ddf1e03fdf8579292
-
SHA512
d4360dd519ccc86d0e0d91f887a93df1a9d21a16bf38e8d35d47b49cc6074ef8982cac729281cc97e550375ce7dd1fdc19c027578a094e44ac47a29196839016
-
SSDEEP
192:ri5cqHqBqjoQDoQk1LeRbioQaoQcQQfQh8osoQ2O:riWqHqBqj1D1ILeRW1a1cdOs12O
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 212 msedge.exe 212 msedge.exe 4868 msedge.exe 4868 msedge.exe 3416 identity_helper.exe 3416 identity_helper.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2336 4868 msedge.exe 83 PID 4868 wrote to memory of 2336 4868 msedge.exe 83 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 876 4868 msedge.exe 85 PID 4868 wrote to memory of 212 4868 msedge.exe 86 PID 4868 wrote to memory of 212 4868 msedge.exe 86 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87 PID 4868 wrote to memory of 4560 4868 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad82b46f8,0x7ffad82b4708,0x7ffad82b47182⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2016 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18156134939278352364,16613919328171718089,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1420 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
6KB
MD5d4c21317207e571c5a5282091de21e4b
SHA176095e6c6208c75b02c950468c1a6ad1a08da0b5
SHA256289ce0ef3554319e1d9a0b08c61ad92427ab463222d58a66670996318430c236
SHA5127c785219864411cf57adc0f2ac5aaae606889f8c523b972f6aa360f40003d9c6e032ce7d6379943753f11609aa0e8f9b88949f1a3a60ec0ccf7f90734c0693ae
-
Filesize
6KB
MD512d7ff7dfa0e319389025531a1d01df8
SHA1c4fdd0b0112839840c86286b265c0ea276c46575
SHA2569c4e7cba7f71a1b335042c76766e5ed4b8a1493be015794e8e2134a322af9283
SHA512cdd63d5dc56f0e9f2bed9c913942b3568f9088970b40d12bc84a0c97314b9f082caa5d6c4ed1cd53ce0893fa96ace1ae3d3259ad4684c3c6f0f564b8670b4277
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5c8fd8cacff0f78d56b6610b93a7ea03c
SHA17510b3fd22e83201c2adf6c65bcadb5ab2a3b236
SHA256da6a93d9059e1844ffef001b8484db415192d1f277636d6b518e4f8e7f81927e
SHA51268a2677ef755b8ee5bebafeb4537bc0f7100cbfd3ac3db3448f0ce63b9b246e99fbb822f6654b652b4a2a9b1aeee931115888cabab9627d8ce3ef2c60d20ff25