Analysis
-
max time kernel
133s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe
Resource
win10v2004-20220414-en
General
-
Target
TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe
-
Size
72KB
-
MD5
2be93df9a3c2e9b0809aa24f46d561f8
-
SHA1
3c3716c0e5721d61afa4997764aa3eaa091505ef
-
SHA256
fbc9106506d47f39fddb3a48693e9b3eb80f400d6c273d1e08ecc7ef417f9352
-
SHA512
92e38a52e72d7a69f6f6781b58423a38dc825dfe4ab5156d457897eb757e8a8888a2c3a1360a7ed3b000c9d96a825e2d7b7226c46b70a02bd4ca28ebd24ee78a
Malware Config
Extracted
asyncrat
0.5.7B
Default
ufyu78r8r7.duckdns.org:8057
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe\"" TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe -
Async RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1756-56-0x0000000000310000-0x0000000000326000-memory.dmp asyncrat behavioral1/memory/1712-60-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1712-61-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1712-62-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1712-63-0x000000000040C72E-mapping.dmp asyncrat behavioral1/memory/1712-65-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1712-67-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Drops startup file 2 IoCs
Processes:
TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe" TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exedescription pid process target process PID 1756 set thread context of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exedescription pid process target process PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe PID 1756 wrote to memory of 1712 1756 TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe installutil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe"C:\Users\Admin\AppData\Local\Temp\TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1712-57-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1712-58-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1712-60-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1712-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1712-62-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1712-63-0x000000000040C72E-mapping.dmp
-
memory/1712-65-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1712-67-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1756-54-0x0000000000960000-0x0000000000976000-memory.dmpFilesize
88KB
-
memory/1756-55-0x00000000753B1000-0x00000000753B3000-memory.dmpFilesize
8KB
-
memory/1756-56-0x0000000000310000-0x0000000000326000-memory.dmpFilesize
88KB