Analysis
-
max time kernel
158s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 07:44
Static task
static1
Behavioral task
behavioral1
Sample
clave para descomprimir.factura.20003802.YIs.txt
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
clave para descomprimir.factura.20003802.YIs.txt
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
factura.20003802.YIs.cmd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
factura.20003802.YIs.cmd
Resource
win10v2004-20221111-en
General
-
Target
factura.20003802.YIs.cmd
-
Size
7KB
-
MD5
9e2ec64b4b72b2a179f09e8983cab503
-
SHA1
8ac596246584e5326c3f5512157c825c04321cde
-
SHA256
c3e8f8902c9ea831eaf28fd536f989f73fb7961a7bcd863801796102d9583b30
-
SHA512
9c3a987d0b17f096a69369e5d9c06618b0b03c453b6a9e89ac7486e1579ebcbdbd0a501173e79d6346e2835884c58dccf737d1d87fca0cbfa53991c8390c63bb
-
SSDEEP
96:e4bS5yNfoIZqAfrXfrXk+AfrX/jh0UXQR/sv4+zdHG+An9eQkVxRsUlSxWgd6wzh:6lQOHEn9dkVxRsp6wYmKm
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 29 3968 WScript.exe -
Executes dropped EXE 1 IoCs
Processes:
trist.exepid process 320 trist.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation WScript.exe -
Loads dropped DLL 7 IoCs
Processes:
trist.exepid process 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
trist.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run trist.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\asvbvbfgr = "C:\\QLHDRiKJ\\trist.exe" trist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
trist.exepid process 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe 320 trist.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
trist.exepid process 320 trist.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
trist.exepid process 320 trist.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
trist.exepid process 320 trist.exe 320 trist.exe 320 trist.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
cmd.exeWScript.exedescription pid process target process PID 4536 wrote to memory of 3968 4536 cmd.exe WScript.exe PID 4536 wrote to memory of 3968 4536 cmd.exe WScript.exe PID 3968 wrote to memory of 320 3968 WScript.exe trist.exe PID 3968 wrote to memory of 320 3968 WScript.exe trist.exe PID 3968 wrote to memory of 320 3968 WScript.exe trist.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\factura.20003802.YIs.cmd"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\TaWuWUrHsalEDrXHBzzO.vbs"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\QLHDRiKJ\trist.exe"C:\QLHDRiKJ\trist.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:320
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274.9MB
MD58fed02dff0d226a9eb5b290939f89a31
SHA1c17944428ab1de67e761d9733866fc608dca7c72
SHA256fcf4bd8094a80ec880e00ab79b0f0e63773c410f27cdadb91152e6afa800bfcb
SHA512d61314c82bc819c2f837a5b2efcca72d043143b346856fff63416b41b91fe1bb918d1f5c3d142a1040d4a12d0393dc51e159e8a33645fa0673604818eaf157e5
-
Filesize
274.9MB
MD58fed02dff0d226a9eb5b290939f89a31
SHA1c17944428ab1de67e761d9733866fc608dca7c72
SHA256fcf4bd8094a80ec880e00ab79b0f0e63773c410f27cdadb91152e6afa800bfcb
SHA512d61314c82bc819c2f837a5b2efcca72d043143b346856fff63416b41b91fe1bb918d1f5c3d142a1040d4a12d0393dc51e159e8a33645fa0673604818eaf157e5
-
Filesize
274.9MB
MD58fed02dff0d226a9eb5b290939f89a31
SHA1c17944428ab1de67e761d9733866fc608dca7c72
SHA256fcf4bd8094a80ec880e00ab79b0f0e63773c410f27cdadb91152e6afa800bfcb
SHA512d61314c82bc819c2f837a5b2efcca72d043143b346856fff63416b41b91fe1bb918d1f5c3d142a1040d4a12d0393dc51e159e8a33645fa0673604818eaf157e5
-
Filesize
274.9MB
MD58fed02dff0d226a9eb5b290939f89a31
SHA1c17944428ab1de67e761d9733866fc608dca7c72
SHA256fcf4bd8094a80ec880e00ab79b0f0e63773c410f27cdadb91152e6afa800bfcb
SHA512d61314c82bc819c2f837a5b2efcca72d043143b346856fff63416b41b91fe1bb918d1f5c3d142a1040d4a12d0393dc51e159e8a33645fa0673604818eaf157e5
-
Filesize
692KB
MD56cd81e6343ab21a1d118243af54833a8
SHA1bbe1a06bd85af7099fb111ac13d19df5f7f22cc0
SHA256306970a9d265a45abbd2efaf61002980695b2de7961504cf71e2833f415e82a9
SHA512295446e3732281b3afb6b06684e2642a79e6b284608305291cc01967c45d2ba5892ef687de084dbc9a22180233f1602a8c2236ec969ddda34c25d4f4e6691328
-
Filesize
692KB
MD56cd81e6343ab21a1d118243af54833a8
SHA1bbe1a06bd85af7099fb111ac13d19df5f7f22cc0
SHA256306970a9d265a45abbd2efaf61002980695b2de7961504cf71e2833f415e82a9
SHA512295446e3732281b3afb6b06684e2642a79e6b284608305291cc01967c45d2ba5892ef687de084dbc9a22180233f1602a8c2236ec969ddda34c25d4f4e6691328
-
Filesize
692KB
MD56cd81e6343ab21a1d118243af54833a8
SHA1bbe1a06bd85af7099fb111ac13d19df5f7f22cc0
SHA256306970a9d265a45abbd2efaf61002980695b2de7961504cf71e2833f415e82a9
SHA512295446e3732281b3afb6b06684e2642a79e6b284608305291cc01967c45d2ba5892ef687de084dbc9a22180233f1602a8c2236ec969ddda34c25d4f4e6691328
-
Filesize
692KB
MD56cd81e6343ab21a1d118243af54833a8
SHA1bbe1a06bd85af7099fb111ac13d19df5f7f22cc0
SHA256306970a9d265a45abbd2efaf61002980695b2de7961504cf71e2833f415e82a9
SHA512295446e3732281b3afb6b06684e2642a79e6b284608305291cc01967c45d2ba5892ef687de084dbc9a22180233f1602a8c2236ec969ddda34c25d4f4e6691328
-
Filesize
1.4MB
MD5b16ad0dd6c69c0c117c9d3647517786c
SHA1825a54040c8e8dfe9ffb243796df806ee5b05708
SHA256e8eace4e643ba86e5c4d1b966037a47e53836b5d328f2295713184613a72020f
SHA51223512007a593d62c446923c446b07d64476cecf9f7ea22dbdbe48965daa482517c7f3f50a55b7b6ed3989be3df2f96004cafe3bb2204bcde401aae00ffd44632
-
Filesize
1.4MB
MD5b16ad0dd6c69c0c117c9d3647517786c
SHA1825a54040c8e8dfe9ffb243796df806ee5b05708
SHA256e8eace4e643ba86e5c4d1b966037a47e53836b5d328f2295713184613a72020f
SHA51223512007a593d62c446923c446b07d64476cecf9f7ea22dbdbe48965daa482517c7f3f50a55b7b6ed3989be3df2f96004cafe3bb2204bcde401aae00ffd44632
-
Filesize
2.0MB
MD5db67e9196605d61d8278e5278777c71f
SHA16fe39b3ace96505269745ed2b81975abb5aea647
SHA2569b5f85fb164d177a24a521df6a9515f1dfb502d1b83581d37dae8ac3f1ad9010
SHA512d2a77d6c1c7771e714f5a19db82823a8a4dd0f0402aca0751d17e7b4d66219049aa33eab3f3841de251f7393f0d01e3c7664ef0aa17f5593ba0f569d2bfe7022
-
Filesize
2.0MB
MD5db67e9196605d61d8278e5278777c71f
SHA16fe39b3ace96505269745ed2b81975abb5aea647
SHA2569b5f85fb164d177a24a521df6a9515f1dfb502d1b83581d37dae8ac3f1ad9010
SHA512d2a77d6c1c7771e714f5a19db82823a8a4dd0f0402aca0751d17e7b4d66219049aa33eab3f3841de251f7393f0d01e3c7664ef0aa17f5593ba0f569d2bfe7022
-
Filesize
4KB
MD53e7d1bf85c27b185a920dc26b776758e
SHA13623ff4e4d244d951426647b5f765dec5bbdd99a
SHA256d5be03e38f60722dca24be527e5e97b60e383dbb6c88452964c9ce4683dcd6f5
SHA512e744594e22afbdc8482cdcad8540ebfe8444e9e4fc093fbfe785421cb77d8543f7525327e3b5ba299194944bf45afb896f7d5688ea44f840c57e2c2460b77869
-
Filesize
6KB
MD5b8ee6b36f59e39b05a6163208cf84bda
SHA1160267dc9270881c4725d4a647f4f1510753e7a0
SHA25670e35afbfb7460aa337eae5b669df347efd61604d5fc5ce746b8723a97ff6138
SHA5122ceb4209570e9ee1b2c80b8de71bc413a24ec588ec11e1d1fd54c014c3f3574b1af972fddd8bb9d231ceb32e30ba1cca7538263cfcdb213bfabb968c0197c8eb