Analysis
-
max time kernel
299s -
max time network
320s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
06-07-2021 16:18
Static task
static1
Behavioral task
behavioral1
Sample
Copia de la denuncia fiscal presentada en su contra NUNC Numero Unico de Noticia Criminal ESM/Copia.vbs
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Copia de la denuncia fiscal presentada en su contra NUNC Numero Unico de Noticia Criminal ESM/Copia.vbs
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Copia de la denuncia fiscal presentada en su contra NUNC Numero Unico de Noticia Criminal ESM/Requer.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Copia de la denuncia fiscal presentada en su contra NUNC Numero Unico de Noticia Criminal ESM/Requer.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Copia de la denuncia fiscal presentada en su contra NUNC Numero Unico de Noticia Criminal ESM/SPOA S.js
Resource
win7v20210410
Behavioral task
behavioral6
Sample
Copia de la denuncia fiscal presentada en su contra NUNC Numero Unico de Noticia Criminal ESM/SPOA S.js
Resource
win10v20210410
General
-
Target
Copia de la denuncia fiscal presentada en su contra NUNC Numero Unico de Noticia Criminal ESM/Requer.exe
-
Size
792KB
-
MD5
c6110aa7ac18ab20d2a402792bddf18c
-
SHA1
58283d8319b7b61869484cea210462d66118bfd9
-
SHA256
af6f738044f9f5c188557f3e6a72ad130aa32fb25d15d3826f250abd25cb7b95
-
SHA512
6c4a16ea11d5d596b3313898c2d734d5f034f4229c8a56a9d9a64a96d646ce703d238318bb7171064347ce866a97a989977b19daf3f17543098c7e179352aae4
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Requer.exedescription pid process target process PID 1668 set thread context of 368 1668 Requer.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Requer.exepid process 1668 Requer.exe 1668 Requer.exe 1668 Requer.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
Processes:
Requer.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 1668 Requer.exe Token: SeDebugPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe Token: 33 368 MSBuild.exe Token: SeIncBasePriorityPrivilege 368 MSBuild.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Requer.exedescription pid process target process PID 1668 wrote to memory of 1692 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 1692 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 1692 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 1692 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 368 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 368 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 368 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 368 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 368 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 368 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 368 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 368 1668 Requer.exe MSBuild.exe PID 1668 wrote to memory of 368 1668 Requer.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Copia de la denuncia fiscal presentada en su contra NUNC Numero Unico de Noticia Criminal ESM\Requer.exe"C:\Users\Admin\AppData\Local\Temp\Copia de la denuncia fiscal presentada en su contra NUNC Numero Unico de Noticia Criminal ESM\Requer.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/368-65-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/368-66-0x000000000040677E-mapping.dmp
-
memory/368-67-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/368-69-0x00000000049A0000-0x00000000049A1000-memory.dmpFilesize
4KB
-
memory/1668-59-0x0000000000B90000-0x0000000000B91000-memory.dmpFilesize
4KB
-
memory/1668-61-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/1668-62-0x00000000003B0000-0x00000000003B2000-memory.dmpFilesize
8KB
-
memory/1668-63-0x0000000004AD0000-0x0000000004B43000-memory.dmpFilesize
460KB
-
memory/1668-64-0x00000000006F0000-0x0000000000715000-memory.dmpFilesize
148KB