Analysis
-
max time kernel
37s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09-06-2022 17:04
Static task
static1
Behavioral task
behavioral1
Sample
DOMUMENTO DE TRANSACCION REALIZADA.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DOMUMENTO DE TRANSACCION REALIZADA.exe
Resource
win10-20220414-en
Behavioral task
behavioral3
Sample
DOMUMENTO DE TRANSACCION REALIZADA.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral4
Sample
DOMUMENTO DE TRANSACCION REALIZADA.exe
Resource
win11-20220223-en
General
-
Target
DOMUMENTO DE TRANSACCION REALIZADA.exe
-
Size
126KB
-
MD5
8c52bf0ad28692c8e274874606c362dd
-
SHA1
ebcda75002db41d1a7f3597ca9467aab625439f7
-
SHA256
ac6da2e8ec05b1e8e562c15745997b48c0f51aeb823d4858445123060f40bb57
-
SHA512
62dc35a98757814ceaec1f5ff41d97641e5ceabb3e5511ad79be3db272d63fbd001bb62ea9f019a773dd5293dd4993a87d775825dda827b5dd9c1a05d274bf24
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1876 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
DOMUMENTO DE TRANSACCION REALIZADA.exedescription pid process Token: SeDebugPrivilege 872 DOMUMENTO DE TRANSACCION REALIZADA.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
DOMUMENTO DE TRANSACCION REALIZADA.execmd.exedescription pid process target process PID 872 wrote to memory of 1324 872 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 872 wrote to memory of 1324 872 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 872 wrote to memory of 1324 872 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 872 wrote to memory of 1324 872 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 872 wrote to memory of 108 872 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 872 wrote to memory of 108 872 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 872 wrote to memory of 108 872 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 872 wrote to memory of 108 872 DOMUMENTO DE TRANSACCION REALIZADA.exe cmd.exe PID 108 wrote to memory of 1876 108 cmd.exe timeout.exe PID 108 wrote to memory of 1876 108 cmd.exe timeout.exe PID 108 wrote to memory of 1876 108 cmd.exe timeout.exe PID 108 wrote to memory of 1876 108 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOMUMENTO DE TRANSACCION REALIZADA.exe"C:\Users\Admin\AppData\Local\Temp\DOMUMENTO DE TRANSACCION REALIZADA.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 202⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 203⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/108-59-0x0000000000000000-mapping.dmp
-
memory/872-54-0x0000000000A60000-0x0000000000A84000-memory.dmpFilesize
144KB
-
memory/872-55-0x00000000764C1000-0x00000000764C3000-memory.dmpFilesize
8KB
-
memory/872-57-0x00000000061C0000-0x00000000063D2000-memory.dmpFilesize
2.1MB
-
memory/872-58-0x0000000004F00000-0x0000000004F4C000-memory.dmpFilesize
304KB
-
memory/1324-56-0x0000000000000000-mapping.dmp
-
memory/1876-60-0x0000000000000000-mapping.dmp