Analysis
-
max time kernel
42s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 19:35
Behavioral task
behavioral1
Sample
Pedido Despachado.eml
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0000011506_03BUC.pdf
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
email-plain-1.txt
Resource
win7-20240903-en
General
-
Target
email-html-2.html
-
Size
12KB
-
MD5
65ebc7bf9cceee826cf9eb3b536bbf6a
-
SHA1
aa822a238aa75fa1a25cb24c484031d914826dc8
-
SHA256
ea4bc238cd5721ee69dc8664e5873f25fa6ac4011df35bc539a3322bab5d3828
-
SHA512
e4017fd20c3f9b62e0e8bb757096f3f496da355aeadcd3ae11b13a6ed9bdd07fe9562295364f0319dbf802a5e17cdd0caad61a8e353e72279d0d166463f81857
-
SSDEEP
192:tx2PUx2Sx2Bx23Bx2QGx2N8Bx27NNr+/uT+:v7BmOTcm8TKNr+/S+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2016 2520 chrome.exe 31 PID 2520 wrote to memory of 2016 2520 chrome.exe 31 PID 2520 wrote to memory of 2016 2520 chrome.exe 31 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 1800 2520 chrome.exe 33 PID 2520 wrote to memory of 2008 2520 chrome.exe 34 PID 2520 wrote to memory of 2008 2520 chrome.exe 34 PID 2520 wrote to memory of 2008 2520 chrome.exe 34 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35 PID 2520 wrote to memory of 2680 2520 chrome.exe 35
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a29758,0x7fef6a29768,0x7fef6a297782⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1300,i,10099630383296551764,5957611627982467839,131072 /prefetch:22⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1536 --field-trial-handle=1300,i,10099630383296551764,5957611627982467839,131072 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1300,i,10099630383296551764,5957611627982467839,131072 /prefetch:82⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2260 --field-trial-handle=1300,i,10099630383296551764,5957611627982467839,131072 /prefetch:12⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1300,i,10099630383296551764,5957611627982467839,131072 /prefetch:12⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1492 --field-trial-handle=1300,i,10099630383296551764,5957611627982467839,131072 /prefetch:22⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3536 --field-trial-handle=1300,i,10099630383296551764,5957611627982467839,131072 /prefetch:82⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5bb5b25f60b84c9fb6e9a3bf6734b23c8
SHA1bb7e514ea82efa48033d4f62f1a2dd3ea43b9339
SHA25606e05c6d1024d461853e9343a5e07157105623b12d515047f5455e55958187f1
SHA5123cb1020cfed3e4ae168412785240b5f3f89bf6f783cf34eefdfbaa34fa7c50e5c118c3a2b3846a37ac45be23a2d091875765aff56143f2aee3cbbd13c672c996
-
Filesize
5KB
MD561ad9429d57e283c1af632f6d8d744f4
SHA17b9cc4404ef4fe69831419e67099371e08311d7b
SHA2566971063e3dfbf9169afad21af0cfe3069df5e60aaa513d9d9c98bb894e7b9306
SHA5127620189276e86477181aaef093593cbac53f732cd4092b5e59526e78c4ffb167d4333a14663f8561fe49fce34d35b25eccfeabb13e7301cb2aa353eecefc401f
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc