Analysis
-
max time kernel
72s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
Curso de Actualización para la generación y manejo de la DUCA T para la facilitación de envíos de socorro.ics
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Curso de Actualización para la generación y manejo de la DUCA T para la facilitación de envíos de socorro.ics
Resource
win10v2004-20230220-en
General
-
Target
Curso de Actualización para la generación y manejo de la DUCA T para la facilitación de envíos de socorro.ics
-
Size
2KB
-
MD5
5dca633f627e2f4596c80c01d0788a35
-
SHA1
675fa6f0afc77770dd4c80e6bbf3c6b124041e40
-
SHA256
7b5476a09e8947a87dab87449b9d3e2711762a50362bd9beb41a2aa4aa02bcf3
-
SHA512
ebc33b4d95ab981536e32e5a32c79bc09b765d2dffaaec48dbbb3b4553494fa7e42a678fb6665e3b8a9c76bc1cde5fbac47da5598014bba9aa54c9416f2a4b4f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4792 1608 WerFault.exe 85 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3584 Winword.exe 3584 Winword.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2112 OpenWith.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 2112 OpenWith.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe 3584 Winword.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3584 2112 OpenWith.exe 86 PID 2112 wrote to memory of 3584 2112 OpenWith.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Curso de Actualización para la generación y manejo de la DUCA T para la facilitación de envíos de socorro.ics"1⤵
- Modifies registry class
PID:4824
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\AppData\Local\Temp\Curso de Actualización para la generación y manejo de la DUCA T para la facilitación de envíos de socorro.ics"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3584
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 364 -p 1608 -ip 16081⤵PID:2184
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1608 -s 17561⤵
- Program crash
PID:4792