Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 16:47
Static task
static1
Behavioral task
behavioral1
Sample
Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe
Resource
win10v2004-20220812-en
General
-
Target
Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe
-
Size
3.2MB
-
MD5
bc350e8ec68185dca18aca4c6d774f4b
-
SHA1
2a7e884eae9a14f2583e41ce3fe4f0e32d47e0bc
-
SHA256
351237effe536fd82440d7925eff69ab1d779f226f877c7b2c592b0b0480f5ee
-
SHA512
ca7d322987d0680b2b2af844e57f368aa7dabbe2b2787a75d4965c50589521722d1ade561c0bdd20ed8fe812a309eb19967c5385e54109557f55e2dd085c2677
-
SSDEEP
98304:3lCI7fHrtFkwdYX4kBmyK/4FPQYbIQ3J5Wp:3ltLMwWnp24FP7f
Malware Config
Extracted
bitrat
1.38
pedroleonta822.con-ip.com:5020
-
communication_password
202cb962ac59075b964b07152d234b70
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1516-64-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1516-66-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1516-67-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1516-69-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1516-70-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1516-71-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1516-73-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1516-76-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\chrome = "\"C:\\Users\\Admin\\AppData\\Roaming\\Ljqcjwv\\chrome.exe\"" Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
InstallUtil.exepid process 1516 InstallUtil.exe 1516 InstallUtil.exe 1516 InstallUtil.exe 1516 InstallUtil.exe 1516 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exedescription pid process target process PID 1816 set thread context of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exeComprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exepid process 2036 powershell.exe 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exepowershell.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe Token: SeDebugPrivilege 2036 powershell.exe Token: SeDebugPrivilege 1516 InstallUtil.exe Token: SeShutdownPrivilege 1516 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
InstallUtil.exepid process 1516 InstallUtil.exe 1516 InstallUtil.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exedescription pid process target process PID 1816 wrote to memory of 2036 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe powershell.exe PID 1816 wrote to memory of 2036 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe powershell.exe PID 1816 wrote to memory of 2036 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe powershell.exe PID 1816 wrote to memory of 2036 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe powershell.exe PID 1816 wrote to memory of 1180 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1180 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1180 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1180 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1180 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1180 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1180 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1624 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1624 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1624 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1624 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1624 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1624 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1624 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe PID 1816 wrote to memory of 1516 1816 Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe"C:\Users\Admin\AppData\Local\Temp\Comprob. DEPOSITO EN EFECTIVO cancelacion de FA-927347295424.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:1180
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:1624
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1516