Resubmissions
23/03/2023, 17:55
230323-whn93abc2w 323/03/2023, 17:50
230323-we39tabb9w 423/03/2023, 17:45
230323-wb42yahc35 423/03/2023, 17:43
230323-wapkvshc27 323/03/2023, 17:41
230323-v9he6ahc22 1Analysis
-
max time kernel
135s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20230220-es -
resource tags
arch:x64arch:x86image:win10-20230220-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
23/03/2023, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
Solicitar Cotización.rar
Resource
win10-20230220-es
General
-
Target
Solicitar Cotización.rar
-
Size
718KB
-
MD5
8d8f2fc8051dbb1143da9700013bd4d7
-
SHA1
6bc659f9d097cac792f029f28761df88a954d822
-
SHA256
dabb83dc8b5700dcd8458558d945e71145bf83564c58b020d913f7929289a214
-
SHA512
c02dd3377a78671efaaaed7d648625b94aa168931ca85f906682da0f614e26097ac91460b08fa58cfbc07d00b36e61aa0f60e0acdd65d98fdda18f9ffdea187d
-
SSDEEP
12288:EXftIvcf1jC0uYfFZ3ZmMhNRqBck38lxrgx9fkq9upf/ZpOX0xK6xiPu:cfSv+O0uY8MBKAgx1uZOMLN
Malware Config
Signatures
-
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri taskmgr.exe File created C:\Windows\rescache\_merged\860799236\610465418.pri taskmgr.exe File created C:\Windows\rescache\_merged\1301087654\4010849688.pri taskmgr.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri taskmgr.exe File created C:\Windows\rescache\_merged\4272278488\3302449443.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\rar_auto_file\shell\open OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "2" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Applications\7z.exe\shell\open\command\ = "\"C:\\Program Files\\7-Zip\\7z.exe\" \"%1\"" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Applications\7z.exe\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Applications\7z.exe\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 500031000000000054567b961000372d5a6970003c0009000400efbe54567b9654567b962e00000084a50100000008000000000000000000000000000000234f200037002d005a0069007000000014000000 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\.rar\ = "rar_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\rar_auto_file\shell OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 8c0031000000000054569d96110050524f4752417e310000740009000400efbe724a6fa854569d962e0000003f0000000000010000000000000000004a0000000000fc965400500072006f006700720061006d002000460069006c0065007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003100000018000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\.rar OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Applications\7z.exe OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Applications\7z.exe\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\rar_auto_file\shell\open\command OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Applications OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\rar_auto_file\shell\open\command\ = "\"C:\\Program Files\\7-Zip\\7z.exe\" \"%1\"" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4432 OpenWith.exe 3828 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 4144 7z.exe Token: 35 4144 7z.exe Token: SeDebugPrivilege 3828 taskmgr.exe Token: SeSystemProfilePrivilege 3828 taskmgr.exe Token: SeCreateGlobalPrivilege 3828 taskmgr.exe Token: 33 3828 taskmgr.exe Token: SeIncBasePriorityPrivilege 3828 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe 3828 taskmgr.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4144 4432 OpenWith.exe 68 PID 4432 wrote to memory of 4144 4432 OpenWith.exe 68
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Solicitar Cotización.rar"1⤵
- Modifies registry class
PID:632
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files\7-Zip\7z.exe"C:\Program Files\7-Zip\7z.exe" "C:\Users\Admin\AppData\Local\Temp\Solicitar Cotización.rar"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3828