Analysis
-
max time kernel
37s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
Documentos de envío.exe
Resource
win7-20220812-en
General
-
Target
Documentos de envío.exe
-
Size
971KB
-
MD5
3be3d06640e5f40fa76db622b0bc5b0c
-
SHA1
bcfb43ee3540191c8dd215917d6de6890e2eac8d
-
SHA256
bfd1a1b3ca8899504a6513dcc986298fd2c82b2c82ae7afd91d9d0046ea795b0
-
SHA512
879e2b593857574f5618129e2853ecaa5ce61ec40c6c0f435b876173fd7e872afa99f4d29625cdf77cfe00a15165ba7157c7524b4cb3ace872ff3f203e981f74
-
SSDEEP
12288:APprYT9LX7BIFLGEzO7w3H6eeEKiRlZ6kBEf+7j9bVpQWsNTADQjL9QWi8pVvc1p:tk76CH6eyiROc0+7JwzTRjJQJ8pBcO
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Documentos de envío.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Documentos de envío.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Documentos de envío.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Documentos de envío.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Documentos de envío.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Documentos de envío.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1784 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1436 Documentos de envío.exe 1436 Documentos de envío.exe 1436 Documentos de envío.exe 1436 Documentos de envío.exe 1436 Documentos de envío.exe 1436 Documentos de envío.exe 1436 Documentos de envío.exe 1436 Documentos de envío.exe 1436 Documentos de envío.exe 1436 Documentos de envío.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1436 Documentos de envío.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1436 wrote to memory of 1784 1436 Documentos de envío.exe 28 PID 1436 wrote to memory of 1784 1436 Documentos de envío.exe 28 PID 1436 wrote to memory of 1784 1436 Documentos de envío.exe 28 PID 1436 wrote to memory of 1784 1436 Documentos de envío.exe 28 PID 1436 wrote to memory of 1396 1436 Documentos de envío.exe 30 PID 1436 wrote to memory of 1396 1436 Documentos de envío.exe 30 PID 1436 wrote to memory of 1396 1436 Documentos de envío.exe 30 PID 1436 wrote to memory of 1396 1436 Documentos de envío.exe 30 PID 1436 wrote to memory of 2016 1436 Documentos de envío.exe 31 PID 1436 wrote to memory of 2016 1436 Documentos de envío.exe 31 PID 1436 wrote to memory of 2016 1436 Documentos de envío.exe 31 PID 1436 wrote to memory of 2016 1436 Documentos de envío.exe 31 PID 1436 wrote to memory of 1524 1436 Documentos de envío.exe 32 PID 1436 wrote to memory of 1524 1436 Documentos de envío.exe 32 PID 1436 wrote to memory of 1524 1436 Documentos de envío.exe 32 PID 1436 wrote to memory of 1524 1436 Documentos de envío.exe 32 PID 1436 wrote to memory of 272 1436 Documentos de envío.exe 33 PID 1436 wrote to memory of 272 1436 Documentos de envío.exe 33 PID 1436 wrote to memory of 272 1436 Documentos de envío.exe 33 PID 1436 wrote to memory of 272 1436 Documentos de envío.exe 33 PID 1436 wrote to memory of 364 1436 Documentos de envío.exe 34 PID 1436 wrote to memory of 364 1436 Documentos de envío.exe 34 PID 1436 wrote to memory of 364 1436 Documentos de envío.exe 34 PID 1436 wrote to memory of 364 1436 Documentos de envío.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Documentos de envío.exe"C:\Users\Admin\AppData\Local\Temp\Documentos de envío.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRKUqkwqwkUcB" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9F1E.tmp"2⤵
- Creates scheduled task(s)
PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\Documentos de envío.exe"{path}"2⤵PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\Documentos de envío.exe"{path}"2⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\Documentos de envío.exe"{path}"2⤵PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\Documentos de envío.exe"{path}"2⤵PID:272
-
-
C:\Users\Admin\AppData\Local\Temp\Documentos de envío.exe"{path}"2⤵PID:364
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561647bbe55b9685e6bb30400b794513a
SHA1fed35c0d720677f25b91a20cb336b1104ae982c6
SHA256f85dcdb8bae6e598a1df0d40f77bc3d615ebeb85f5cfe547857922890ee40b28
SHA51219de9a495c88d7d681fbf6401961a2efc0b7f99c7229d53cc0f5cf978fd58594d0160cf50eb90ef3504126ff076b8fe7a94e5173365f6b3001053e8a9f346cbd