Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 13:23
Static task
static1
Behavioral task
behavioral1
Sample
Solictud_de_cotizacion (3699663-2020).exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Solictud_de_cotizacion (3699663-2020).exe
Resource
win10v2004-20220414-en
General
-
Target
Solictud_de_cotizacion (3699663-2020).exe
-
Size
553KB
-
MD5
748e4a49b7e306d7eb45aaa7b10faf5d
-
SHA1
ed4e974775f050e65233116fdbb28921618fceb7
-
SHA256
e232e9c0d66770fe8e50466f3dd073160a8ddaf565ed0382ce997226c1b364dd
-
SHA512
378f5c0ed4b94405a1287febc6a12901cbc8b386b41b66d9f2d007d704780424f3427b6e6973480656954f3d31540cacdc5e935118d4d561bba1bf399fc8d839
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Host.exeHost.exeHost.exepid process 1288 Host.exe 1900 Host.exe 1872 Host.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Install\Host.exe upx C:\Users\Admin\AppData\Roaming\Install\Host.exe upx \Users\Admin\AppData\Roaming\Install\Host.exe upx C:\Users\Admin\AppData\Roaming\Install\Host.exe upx C:\Users\Admin\AppData\Roaming\Install\Host.exe upx C:\Users\Admin\AppData\Roaming\Install\Host.exe upx -
Loads dropped DLL 2 IoCs
Processes:
Solictud_de_cotizacion (3699663-2020).exepid process 1548 Solictud_de_cotizacion (3699663-2020).exe 1548 Solictud_de_cotizacion (3699663-2020).exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Host.exeSolictud_de_cotizacion (3699663-2020).exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Solictud_de_cotizacion (3699663-2020).exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Solictud_de_cotizacion (3699663-2020).exe" Solictud_de_cotizacion (3699663-2020).exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Solictud_de_cotizacion (3699663-2020).exeHost.exeSolictud_de_cotizacion (3699663-2020).exedescription pid process target process PID 1500 set thread context of 1548 1500 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 1288 set thread context of 1900 1288 Host.exe Host.exe PID 796 set thread context of 1180 796 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Solictud_de_cotizacion (3699663-2020).exeSolictud_de_cotizacion (3699663-2020).exeHost.exeHost.exeSolictud_de_cotizacion (3699663-2020).exeSolictud_de_cotizacion (3699663-2020).exepid process 1500 Solictud_de_cotizacion (3699663-2020).exe 2032 Solictud_de_cotizacion (3699663-2020).exe 2032 Solictud_de_cotizacion (3699663-2020).exe 1288 Host.exe 2032 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 1872 Host.exe 796 Solictud_de_cotizacion (3699663-2020).exe 2036 Solictud_de_cotizacion (3699663-2020).exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe 1872 Host.exe 2036 Solictud_de_cotizacion (3699663-2020).exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
Solictud_de_cotizacion (3699663-2020).exeHost.exeSolictud_de_cotizacion (3699663-2020).exepid process 1500 Solictud_de_cotizacion (3699663-2020).exe 1288 Host.exe 796 Solictud_de_cotizacion (3699663-2020).exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1840 AcroRd32.exe 1840 AcroRd32.exe 1840 AcroRd32.exe 1840 AcroRd32.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
Solictud_de_cotizacion (3699663-2020).exeSolictud_de_cotizacion (3699663-2020).exeHost.exeSolictud_de_cotizacion (3699663-2020).exeSolictud_de_cotizacion (3699663-2020).exedescription pid process target process PID 1500 wrote to memory of 1840 1500 Solictud_de_cotizacion (3699663-2020).exe AcroRd32.exe PID 1500 wrote to memory of 1840 1500 Solictud_de_cotizacion (3699663-2020).exe AcroRd32.exe PID 1500 wrote to memory of 1840 1500 Solictud_de_cotizacion (3699663-2020).exe AcroRd32.exe PID 1500 wrote to memory of 1840 1500 Solictud_de_cotizacion (3699663-2020).exe AcroRd32.exe PID 1500 wrote to memory of 1548 1500 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 1500 wrote to memory of 1548 1500 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 1500 wrote to memory of 1548 1500 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 1500 wrote to memory of 1548 1500 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 1500 wrote to memory of 2032 1500 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 1500 wrote to memory of 2032 1500 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 1500 wrote to memory of 2032 1500 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 1500 wrote to memory of 2032 1500 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 1548 wrote to memory of 1288 1548 Solictud_de_cotizacion (3699663-2020).exe Host.exe PID 1548 wrote to memory of 1288 1548 Solictud_de_cotizacion (3699663-2020).exe Host.exe PID 1548 wrote to memory of 1288 1548 Solictud_de_cotizacion (3699663-2020).exe Host.exe PID 1548 wrote to memory of 1288 1548 Solictud_de_cotizacion (3699663-2020).exe Host.exe PID 1288 wrote to memory of 1844 1288 Host.exe AcroRd32.exe PID 1288 wrote to memory of 1844 1288 Host.exe AcroRd32.exe PID 1288 wrote to memory of 1844 1288 Host.exe AcroRd32.exe PID 1288 wrote to memory of 1844 1288 Host.exe AcroRd32.exe PID 1288 wrote to memory of 1900 1288 Host.exe Host.exe PID 1288 wrote to memory of 1900 1288 Host.exe Host.exe PID 1288 wrote to memory of 1900 1288 Host.exe Host.exe PID 1288 wrote to memory of 1900 1288 Host.exe Host.exe PID 1288 wrote to memory of 1872 1288 Host.exe Host.exe PID 1288 wrote to memory of 1872 1288 Host.exe Host.exe PID 1288 wrote to memory of 1872 1288 Host.exe Host.exe PID 1288 wrote to memory of 1872 1288 Host.exe Host.exe PID 2032 wrote to memory of 796 2032 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 2032 wrote to memory of 796 2032 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 2032 wrote to memory of 796 2032 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 2032 wrote to memory of 796 2032 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 796 wrote to memory of 640 796 Solictud_de_cotizacion (3699663-2020).exe AcroRd32.exe PID 796 wrote to memory of 640 796 Solictud_de_cotizacion (3699663-2020).exe AcroRd32.exe PID 796 wrote to memory of 640 796 Solictud_de_cotizacion (3699663-2020).exe AcroRd32.exe PID 796 wrote to memory of 640 796 Solictud_de_cotizacion (3699663-2020).exe AcroRd32.exe PID 796 wrote to memory of 1180 796 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 796 wrote to memory of 1180 796 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 796 wrote to memory of 1180 796 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 796 wrote to memory of 1180 796 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 796 wrote to memory of 2036 796 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 796 wrote to memory of 2036 796 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 796 wrote to memory of 2036 796 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe PID 796 wrote to memory of 2036 796 Solictud_de_cotizacion (3699663-2020).exe Solictud_de_cotizacion (3699663-2020).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Orden.pdf"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Orden.pdf"4⤵
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe" 2 1900 70808694⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe" 2 1548 70800112⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Orden.pdf"4⤵
-
C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"4⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe" 2 1180 70812904⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Orden.pdfFilesize
175KB
MD5d4005f6c245d66fe21b8671d28dfbf12
SHA1f9405fc9f33a084c689df8dcd6dc59afa98b4282
SHA25649e52034c5e32c1c4c2f3bbfc4e99ce4ac917e934373a93d5ad2df5c364d63d8
SHA5126efb3cccd57e30c80f0bf00be0aa646fde75df78b014ed0aa85aaeb35644e7fb96c1c089ba34946627c1df2368c67ff5ce49fd7e44e224dc5980af59814f3f10
-
C:\Users\Admin\AppData\Local\Temp\Orden.pdfFilesize
175KB
MD5d4005f6c245d66fe21b8671d28dfbf12
SHA1f9405fc9f33a084c689df8dcd6dc59afa98b4282
SHA25649e52034c5e32c1c4c2f3bbfc4e99ce4ac917e934373a93d5ad2df5c364d63d8
SHA5126efb3cccd57e30c80f0bf00be0aa646fde75df78b014ed0aa85aaeb35644e7fb96c1c089ba34946627c1df2368c67ff5ce49fd7e44e224dc5980af59814f3f10
-
C:\Users\Admin\AppData\Local\Temp\Orden.pdfFilesize
175KB
MD5d4005f6c245d66fe21b8671d28dfbf12
SHA1f9405fc9f33a084c689df8dcd6dc59afa98b4282
SHA25649e52034c5e32c1c4c2f3bbfc4e99ce4ac917e934373a93d5ad2df5c364d63d8
SHA5126efb3cccd57e30c80f0bf00be0aa646fde75df78b014ed0aa85aaeb35644e7fb96c1c089ba34946627c1df2368c67ff5ce49fd7e44e224dc5980af59814f3f10
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
553KB
MD5748e4a49b7e306d7eb45aaa7b10faf5d
SHA1ed4e974775f050e65233116fdbb28921618fceb7
SHA256e232e9c0d66770fe8e50466f3dd073160a8ddaf565ed0382ce997226c1b364dd
SHA512378f5c0ed4b94405a1287febc6a12901cbc8b386b41b66d9f2d007d704780424f3427b6e6973480656954f3d31540cacdc5e935118d4d561bba1bf399fc8d839
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
553KB
MD5748e4a49b7e306d7eb45aaa7b10faf5d
SHA1ed4e974775f050e65233116fdbb28921618fceb7
SHA256e232e9c0d66770fe8e50466f3dd073160a8ddaf565ed0382ce997226c1b364dd
SHA512378f5c0ed4b94405a1287febc6a12901cbc8b386b41b66d9f2d007d704780424f3427b6e6973480656954f3d31540cacdc5e935118d4d561bba1bf399fc8d839
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
553KB
MD5748e4a49b7e306d7eb45aaa7b10faf5d
SHA1ed4e974775f050e65233116fdbb28921618fceb7
SHA256e232e9c0d66770fe8e50466f3dd073160a8ddaf565ed0382ce997226c1b364dd
SHA512378f5c0ed4b94405a1287febc6a12901cbc8b386b41b66d9f2d007d704780424f3427b6e6973480656954f3d31540cacdc5e935118d4d561bba1bf399fc8d839
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
553KB
MD5748e4a49b7e306d7eb45aaa7b10faf5d
SHA1ed4e974775f050e65233116fdbb28921618fceb7
SHA256e232e9c0d66770fe8e50466f3dd073160a8ddaf565ed0382ce997226c1b364dd
SHA512378f5c0ed4b94405a1287febc6a12901cbc8b386b41b66d9f2d007d704780424f3427b6e6973480656954f3d31540cacdc5e935118d4d561bba1bf399fc8d839
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
553KB
MD5748e4a49b7e306d7eb45aaa7b10faf5d
SHA1ed4e974775f050e65233116fdbb28921618fceb7
SHA256e232e9c0d66770fe8e50466f3dd073160a8ddaf565ed0382ce997226c1b364dd
SHA512378f5c0ed4b94405a1287febc6a12901cbc8b386b41b66d9f2d007d704780424f3427b6e6973480656954f3d31540cacdc5e935118d4d561bba1bf399fc8d839
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
553KB
MD5748e4a49b7e306d7eb45aaa7b10faf5d
SHA1ed4e974775f050e65233116fdbb28921618fceb7
SHA256e232e9c0d66770fe8e50466f3dd073160a8ddaf565ed0382ce997226c1b364dd
SHA512378f5c0ed4b94405a1287febc6a12901cbc8b386b41b66d9f2d007d704780424f3427b6e6973480656954f3d31540cacdc5e935118d4d561bba1bf399fc8d839
-
memory/640-80-0x0000000000000000-mapping.dmp
-
memory/796-77-0x0000000000000000-mapping.dmp
-
memory/1180-82-0x000000000040242D-mapping.dmp
-
memory/1288-64-0x0000000000000000-mapping.dmp
-
memory/1500-55-0x00000000001D0000-0x00000000001E1000-memory.dmpFilesize
68KB
-
memory/1500-54-0x0000000074F91000-0x0000000074F93000-memory.dmpFilesize
8KB
-
memory/1548-57-0x000000000040242D-mapping.dmp
-
memory/1840-56-0x0000000000000000-mapping.dmp
-
memory/1844-68-0x0000000000000000-mapping.dmp
-
memory/1872-72-0x0000000000000000-mapping.dmp
-
memory/1900-71-0x000000000040242D-mapping.dmp
-
memory/2032-59-0x0000000000000000-mapping.dmp
-
memory/2036-84-0x0000000000000000-mapping.dmp