Analysis
-
max time kernel
102s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 21:57
Behavioral task
behavioral1
Sample
Factura Electrónica. NWM9709244W4 - IXAJQ7884 (696283) (77.3 KB).msg
Resource
win10v2004-20220901-en
Behavioral task
behavioral2
Sample
WALM_ODM950324V2A_2021070200133021000011.pdf
Resource
win10v2004-20220901-en
General
-
Target
Factura Electrónica. NWM9709244W4 - IXAJQ7884 (696283) (77.3 KB).msg
-
Size
119KB
-
MD5
955aadac15cce2817ece1821bde136ce
-
SHA1
75e234a74d0b9474e11ff5b5ac95a2cbdfb37d3d
-
SHA256
7d49bee6860258ba297bbbb27bdf5cf1f499fb4dd9357e1cbc5ef1035ec53aea
-
SHA512
18ba94a36df4c079431c89141236fc4627b33479c05f462fff5da2041ea953c65e60c3ad9d94c00d1673737869ffc3138ff6e169718d35f5f733c09e17d2d2ef
-
SSDEEP
1536:emMN/cpT/q6z4oIdtzpYC59rSqUNWOjK4XLtfSTn8DGfHsf9gf5JpcQg86Ay7Q7B:ekzC59194xkn80Mf9g6NAy79Bi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 9 IoCs
Processes:
OpenWith.execmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\.msg OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\msg_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\msg_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\msg_auto_file\shell\Read\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\msg_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\msg_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\.msg\ = "msg_auto_file" OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 1480 OpenWith.exe -
Suspicious use of SetWindowsHookEx 37 IoCs
Processes:
OpenWith.exeAcroRd32.exepid process 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 1480 OpenWith.exe 3120 AcroRd32.exe 3120 AcroRd32.exe 3120 AcroRd32.exe 3120 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
OpenWith.exeAcroRd32.exeRdrCEF.exedescription pid process target process PID 1480 wrote to memory of 3120 1480 OpenWith.exe AcroRd32.exe PID 1480 wrote to memory of 3120 1480 OpenWith.exe AcroRd32.exe PID 1480 wrote to memory of 3120 1480 OpenWith.exe AcroRd32.exe PID 3120 wrote to memory of 3676 3120 AcroRd32.exe RdrCEF.exe PID 3120 wrote to memory of 3676 3120 AcroRd32.exe RdrCEF.exe PID 3120 wrote to memory of 3676 3120 AcroRd32.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3320 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe PID 3676 wrote to memory of 3620 3676 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Factura Electrónica. NWM9709244W4 - IXAJQ7884 (696283) (77.3 KB).msg"1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Factura Electrónica. NWM9709244W4 - IXAJQ7884 (696283) (77.3 KB).msg"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C38C6952C7D8CBF2C15051BE3C58A080 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CE880B80F3B93F027328CE413430AA5A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CE880B80F3B93F027328CE413430AA5A --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:14⤵