Analysis

  • max time kernel
    72s
  • max time network
    83s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/05/2023, 15:29

General

  • Target

    Curso de Actualización para la generación y manejo de la DUCA T para la facilitación de envíos de socorro.ics

  • Size

    2KB

  • MD5

    5dca633f627e2f4596c80c01d0788a35

  • SHA1

    675fa6f0afc77770dd4c80e6bbf3c6b124041e40

  • SHA256

    7b5476a09e8947a87dab87449b9d3e2711762a50362bd9beb41a2aa4aa02bcf3

  • SHA512

    ebc33b4d95ab981536e32e5a32c79bc09b765d2dffaaec48dbbb3b4553494fa7e42a678fb6665e3b8a9c76bc1cde5fbac47da5598014bba9aa54c9416f2a4b4f

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 35 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Curso de Actualización para la generación y manejo de la DUCA T para la facilitación de envíos de socorro.ics"
    1⤵
    • Modifies registry class
    PID:4824
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
      "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\AppData\Local\Temp\Curso de Actualización para la generación y manejo de la DUCA T para la facilitación de envíos de socorro.ics"
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3584
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 364 -p 1608 -ip 1608
    1⤵
      PID:2184
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1608 -s 1756
      1⤵
      • Program crash
      PID:4792

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3584-133-0x00007FFD7D130000-0x00007FFD7D140000-memory.dmp

            Filesize

            64KB

          • memory/3584-135-0x00007FFD7D130000-0x00007FFD7D140000-memory.dmp

            Filesize

            64KB

          • memory/3584-134-0x00007FFD7D130000-0x00007FFD7D140000-memory.dmp

            Filesize

            64KB

          • memory/3584-136-0x00007FFD7D130000-0x00007FFD7D140000-memory.dmp

            Filesize

            64KB

          • memory/3584-137-0x00007FFD7D130000-0x00007FFD7D140000-memory.dmp

            Filesize

            64KB

          • memory/3584-138-0x00007FFD7A960000-0x00007FFD7A970000-memory.dmp

            Filesize

            64KB

          • memory/3584-139-0x00007FFD7A960000-0x00007FFD7A970000-memory.dmp

            Filesize

            64KB