Analysis
-
max time kernel
52s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2023 15:15
Static task
static1
Behavioral task
behavioral1
Sample
Orden de compra del proveedor OC_No 1435 27-03-2023.exe
Resource
win7-20230220-en
General
-
Target
Orden de compra del proveedor OC_No 1435 27-03-2023.exe
-
Size
822KB
-
MD5
91da3743bb05e6744e50fe749f5a9cc6
-
SHA1
fbb00ec09354ded8bf1b7f18f2e9cb2ef0e3d3b3
-
SHA256
b3811fa28d3e22cf5029476f6870c54e7fcd4d68da1342bb199ca6d41ed9ff56
-
SHA512
08bb7e82f83aa4d5146838b8cdc2c40382656c8db8775792d850b3bf5426f53a4e5b9e3420c16e4b4140767a030e0eab9d3339f5182f6390def143d470f3f277
-
SSDEEP
12288:LUJB0Oq8p2ZEtCgO27/mW9XqUjX5OFUuOWGt0p4VedclBeHlOrh1CuQvpAoJhZ:AZpTtV7fjc36veA1Gx9D
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
Orden de compra del proveedor OC_No 1435 27-03-2023.exepowershell.exepowershell.exepid process 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe 1124 powershell.exe 1168 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Orden de compra del proveedor OC_No 1435 27-03-2023.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Token: SeDebugPrivilege 1124 powershell.exe Token: SeDebugPrivilege 1168 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
Orden de compra del proveedor OC_No 1435 27-03-2023.exedescription pid process target process PID 1376 wrote to memory of 1124 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe powershell.exe PID 1376 wrote to memory of 1124 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe powershell.exe PID 1376 wrote to memory of 1124 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe powershell.exe PID 1376 wrote to memory of 1124 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe powershell.exe PID 1376 wrote to memory of 1168 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe powershell.exe PID 1376 wrote to memory of 1168 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe powershell.exe PID 1376 wrote to memory of 1168 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe powershell.exe PID 1376 wrote to memory of 1168 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe powershell.exe PID 1376 wrote to memory of 1868 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe schtasks.exe PID 1376 wrote to memory of 1868 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe schtasks.exe PID 1376 wrote to memory of 1868 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe schtasks.exe PID 1376 wrote to memory of 1868 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe schtasks.exe PID 1376 wrote to memory of 748 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 748 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 748 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 748 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 1564 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 1564 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 1564 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 1564 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 864 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 864 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 864 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 864 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 112 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 112 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 112 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 112 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 1172 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 1172 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 1172 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe PID 1376 wrote to memory of 1172 1376 Orden de compra del proveedor OC_No 1435 27-03-2023.exe Orden de compra del proveedor OC_No 1435 27-03-2023.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YCNgsiXL.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YCNgsiXL" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD5D6.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"C:\Users\Admin\AppData\Local\Temp\Orden de compra del proveedor OC_No 1435 27-03-2023.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpD5D6.tmpFilesize
1KB
MD528abd624f5229b260c3e58a83bc4126f
SHA1afd00e326dbbaf7413c7b6e5a80f3f0785790148
SHA2564ea0e9565faa88a3f58e1714b95ae4ba97550aef764c79e233a3a233a50fa7d5
SHA512917cb4cb4c6cfa90c984c43dc9692d543810bde6ebf8d1a7abb06f5fab1b0e10900750e22b23edd027b64a0ba5a18d96e4bf5b78c360bcec3b21a970c502772f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Y8UVJ1IA4GOBJY88KK02.tempFilesize
7KB
MD5d5196f7dc7f860bf8c79a1e7378d4b29
SHA10a4f3e27ad13fa747bca83eb3379c629f4e560e4
SHA25655a8c03a625a99b32c105700a49e5b890f609ba49c79bbf2a91827a0520d0156
SHA5128e194f13f11760feb15c8f45d7f9bd7c07b74edbd540278bc80f31f28adcc9709ea493b95e81b3e768c8a8c5c81969abb238d6d3a724a199bd43acab6a107468
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5d5196f7dc7f860bf8c79a1e7378d4b29
SHA10a4f3e27ad13fa747bca83eb3379c629f4e560e4
SHA25655a8c03a625a99b32c105700a49e5b890f609ba49c79bbf2a91827a0520d0156
SHA5128e194f13f11760feb15c8f45d7f9bd7c07b74edbd540278bc80f31f28adcc9709ea493b95e81b3e768c8a8c5c81969abb238d6d3a724a199bd43acab6a107468
-
memory/1124-74-0x00000000024B0000-0x00000000024F0000-memory.dmpFilesize
256KB
-
memory/1168-75-0x0000000002580000-0x00000000025C0000-memory.dmpFilesize
256KB
-
memory/1168-73-0x0000000002580000-0x00000000025C0000-memory.dmpFilesize
256KB
-
memory/1376-57-0x0000000004DF0000-0x0000000004E30000-memory.dmpFilesize
256KB
-
memory/1376-59-0x0000000007FF0000-0x00000000080A0000-memory.dmpFilesize
704KB
-
memory/1376-58-0x0000000000480000-0x000000000048C000-memory.dmpFilesize
48KB
-
memory/1376-72-0x0000000004420000-0x0000000004458000-memory.dmpFilesize
224KB
-
memory/1376-54-0x0000000000390000-0x0000000000464000-memory.dmpFilesize
848KB
-
memory/1376-56-0x0000000000350000-0x0000000000370000-memory.dmpFilesize
128KB
-
memory/1376-55-0x0000000004DF0000-0x0000000004E30000-memory.dmpFilesize
256KB