Overview
overview
1Static
static
1900243688_1329.zip
windows7-x64
1900243688_1329.zip
windows10-2004-x64
1900243688_1329.pdf
windows7-x64
1900243688_1329.pdf
windows10-2004-x64
1900243688_1329.xml
windows7-x64
1900243688_1329.xml
windows10-2004-x64
1900243688_1329.zip
windows7-x64
1900243688_1329.zip
windows10-2004-x64
1tn-FACTURA...4.docx
windows7-x64
1tn-FACTURA...4.docx
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/05/2023, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
900243688_1329.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
900243688_1329.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
900243688_1329.pdf
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
900243688_1329.pdf
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
900243688_1329.xml
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
900243688_1329.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
900243688_1329.zip
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
900243688_1329.zip
Resource
win10v2004-20230221-en
Behavioral task
behavioral9
Sample
tn-FACTURACIÓN BANCOLDEX 202304.docx
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
tn-FACTURACIÓN BANCOLDEX 202304.docx
Resource
win10v2004-20230220-en
General
-
Target
900243688_1329.xml
-
Size
38KB
-
MD5
a74462267ea27921e8dd43e6a4294199
-
SHA1
dbd825616f53fcf7f9b9046114b2c7e8f389e981
-
SHA256
dd3ab55992b514c73dd67dd7fa7c08a1aeb5e49258783b257b9b759fe5ecd3c1
-
SHA512
daeb261d5ab596a8e859ae463eab5144501b8e7af8160eccacb3d856653d9ef8e65310dd5d1770b2e03908dd26a321af2a859253c6b659e76caa89112bc14cfb
-
SSDEEP
768:omErlOGeGauw+rgY/WzA9I+pII+pqkI+P/I+Pl9BGBdAWEzymrs5nhT1q5gRK9wN:irlOE3rgY+zWI+pII+pfI+P/I+PXBGB/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3137DAE1-EE94-11ED-91A1-F2A4F945A9C1} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000743fd071976334797e6012501984d1f000000000200000000001066000000010000200000006717a64164b59dca367db26813af3e42debe38312e785e15e8ce0494d583a588000000000e80000000020000200000000b3048d818359b5b5a9218f9339bfcf2fd6e1d2c9ce5ca8c8fa2c939c758c0372000000029a78c1e9efa73ef4750b38cea26696a8c6eb48d68eefa3a7072a406ae450ff840000000d10cb4d13fd690f91816a8d5b1dcb8ed371a39f514ff9835bd6182e3cd6d2d66caabdbb4fc14e8a35df1b7c9dbef4d1774c3ba0b6c431258c913544853e5d7ca IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50695308a182d901 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "390420552" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1196 IEXPLORE.EXE 1196 IEXPLORE.EXE 1196 IEXPLORE.EXE 1196 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1056 1456 MSOXMLED.EXE 29 PID 1456 wrote to memory of 1056 1456 MSOXMLED.EXE 29 PID 1456 wrote to memory of 1056 1456 MSOXMLED.EXE 29 PID 1456 wrote to memory of 1056 1456 MSOXMLED.EXE 29 PID 1056 wrote to memory of 1628 1056 iexplore.exe 30 PID 1056 wrote to memory of 1628 1056 iexplore.exe 30 PID 1056 wrote to memory of 1628 1056 iexplore.exe 30 PID 1056 wrote to memory of 1628 1056 iexplore.exe 30 PID 1628 wrote to memory of 1196 1628 IEXPLORE.EXE 31 PID 1628 wrote to memory of 1196 1628 IEXPLORE.EXE 31 PID 1628 wrote to memory of 1196 1628 IEXPLORE.EXE 31 PID 1628 wrote to memory of 1196 1628 IEXPLORE.EXE 31
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\900243688_1329.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1196
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53b06a431b219a560e39def0d8221ee89
SHA14a0a520c0eb1c34a2528a0b0545773c2ee103f4d
SHA256176a87cde703bd014b78cc527506fbfc054809af6454d853f1543bfc0b2a3487
SHA512d9d900169011356d4835eeecad4760bb2f22c22d25a776fb553f8e60b41e13da047869e5d87aef9655e2a0aac3c5e97499d82088c4343743f481e8b5e6df7532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a73943981382d8eae2d2c178abf15ccd
SHA19a1692fcd98e4b72bf96b55530c7b30a5a6d59d0
SHA2568efdd9457c2059ffc39f1da0d0a290f0cfa33eedbb8d8180d5df26531243157e
SHA51201bb67a5758ac53da05cccff61e42caf9b347786bedf17dd0e1f2648c6c16ea5a97c44dd4b1b9e45a16cda987b760c25c298bfc87ba4f360d43773b238eac9c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5420efe43aa1459e10ea941e15b7cde14
SHA114f6b5320cb1a2df851262581fdccc430b5c9090
SHA256ab0d8f94e94fd32b521b61bd1184bc107032992181f9d0ef7a87cf2508a562c7
SHA512bff6bbf2b6a4704f94718e0a8c2c1a6a0557b9ed754785e4847c873959d634f4d56ff0b79a41cdf319b89d40b6fee9a9f3df8f5458a2925290d258cfe8ad35f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD503dbacd3c50c5cb97b2bfe85231b8160
SHA17c33c2d16e07be6b69914e463ef16f2c17b35cb5
SHA256c6bedd270acb028cdb86a1df6b555bd63bfa8f8e50c8098fdc557936f458e110
SHA512f4c0a472dc91d86e6c0ff3f8b1c400fcf9b15683aa1306b58cb27cd8a1b301c618e7e634be6b3452cedfa97f7384d99bdb70a06fa741f0a867117fd17256e956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD560ed340cb7f0f932ebf60f23ff220504
SHA1f7c13072c945ea4e6ffb69d5366c333d936fdecb
SHA256db45f68616c504cb97ba1cbaf7200a8fb8c416cfc325b52bf04f40c5602ec3c6
SHA512ca4a696c4749ad7774e2b52c006a6cb9d402f1358f41d4fef227791dd9cc89c36ade6d747d0998a4c60e0bddebccc18fc62a701fb654a141d4fbd51220204063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cbe04b9824a48598f3ef9a44db0e9c36
SHA101a60791b3d89014e432adfa5c14fc2090f7aa7a
SHA2560efe9af0ce5f658a92a8492a6a7707928f3c0a82150a035d436836eb0912390f
SHA5128509a73330fa07bd8ece3c9bc5ffd3cd3271a5643e77d5bfb97becdc28d8d1450833b48fb45b7896c3143dd54c379cb4edef99ee313c76b183814caf11962085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD583fb6d0b98e2ffbce5b0c1e132cdbf22
SHA1fb5c90a0a0e8c8fafee6d03bac699a9f9e7b8af2
SHA2568aef3e7e32dd8de0d1006e72ff4469dbfd5085d80d5a44c520980245c3720077
SHA512b13e1d6957033ab1c50861e55b8fae1536a431592f0dd04274df115b162d4b9a68f21679734a87a0728f305dd3d674de3674e5a831ef215690f4e22409008272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56754027e73b66a8db8a21bfd02fddfb9
SHA1d54aca54a0618371766910fdce91ee71856f16cd
SHA2568e1cc46791b9061fb57aae829b5869e3b83482426a9dfe10f355c536af634d29
SHA5120722e7673dfe5cf68d78407f7d84156fb316ebd890b6db2003fdffb24c24b5045057a64b585e3e547a2da70e2bd4072795fc975564f0b21ed6a00531d308523a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53b91af9656158e5c8dde2e2e1aad4bda
SHA1f24d67a01e149de09d6e969100c2c8b537ed062f
SHA2564fbfdb33a46b1749b421fbdeb5acd8ec9bd91da241a58623d861b97efdeed946
SHA512ba1ad3c9954f1c26a49a501c74132b493c46db581fe47fe02d4f2ae42befbc44f77afb0bed2bdcb2ce3580ab9541f3ac4a1ceb49023f8dda265948543f4c00c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGZY45B8\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
603B
MD564f5eb33a2766725a3215bf75f5c2bec
SHA156c8524ac075e524c31656cf7a7005089f851e42
SHA25663c7a6bc22b65d328b77cee24f19ac3d1b745f83d11c65ad03b9264d64a52471
SHA512bb12f07acd56f38b48707bf8a844e7863b3e12bd6927255ab2d1837fe291e762a0ec898503dfe5242a942965628336ede972d5a4630076f74e56e89be7f46a40