Analysis

  • max time kernel
    37s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    09-06-2022 17:04

General

  • Target

    DOMUMENTO DE TRANSACCION REALIZADA.exe

  • Size

    126KB

  • MD5

    8c52bf0ad28692c8e274874606c362dd

  • SHA1

    ebcda75002db41d1a7f3597ca9467aab625439f7

  • SHA256

    ac6da2e8ec05b1e8e562c15745997b48c0f51aeb823d4858445123060f40bb57

  • SHA512

    62dc35a98757814ceaec1f5ff41d97641e5ceabb3e5511ad79be3db272d63fbd001bb62ea9f019a773dd5293dd4993a87d775825dda827b5dd9c1a05d274bf24

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DOMUMENTO DE TRANSACCION REALIZADA.exe
    "C:\Users\Admin\AppData\Local\Temp\DOMUMENTO DE TRANSACCION REALIZADA.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe"
      2⤵
        PID:1324
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 20
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:108
        • C:\Windows\SysWOW64\timeout.exe
          timeout 20
          3⤵
          • Delays execution with timeout.exe
          PID:1876

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/108-59-0x0000000000000000-mapping.dmp
    • memory/872-54-0x0000000000A60000-0x0000000000A84000-memory.dmp
      Filesize

      144KB

    • memory/872-55-0x00000000764C1000-0x00000000764C3000-memory.dmp
      Filesize

      8KB

    • memory/872-57-0x00000000061C0000-0x00000000063D2000-memory.dmp
      Filesize

      2.1MB

    • memory/872-58-0x0000000004F00000-0x0000000004F4C000-memory.dmp
      Filesize

      304KB

    • memory/1324-56-0x0000000000000000-mapping.dmp
    • memory/1876-60-0x0000000000000000-mapping.dmp