Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08-08-2023 11:08
Static task
static1
Behavioral task
behavioral1
Sample
prueba de pago.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
prueba de pago.exe
Resource
win10v2004-20230703-en
General
-
Target
prueba de pago.exe
-
Size
560KB
-
MD5
f635f99f740b1bd4f2e5c5d968bf3c4a
-
SHA1
e9d73ba51502695bba19093b63370a431442d225
-
SHA256
11a13f0291f2145e792f3f7d18a1c3747767e93b71292a9fdefed34d52dff3b8
-
SHA512
1de9d951ab3f18dc476275820cbc0a1332cb3376dc3ce2562beb506f79534f971adc7ca20bdedac8ef752d798c2dab2b4a9432ba92d2622891990b0f99316c97
-
SSDEEP
12288:xtHb13bWictv8DDM+1FwFj5u6R257MXXkuOaziOUeq:vbNrcx8DDY5u5VNazDg
Malware Config
Signatures
-
Checks QEMU agent file 2 TTPs 1 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe prueba de pago.exe -
Loads dropped DLL 1 IoCs
pid Process 1792 prueba de pago.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1792 prueba de pago.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2860 1792 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2844 1792 prueba de pago.exe 30 PID 1792 wrote to memory of 2844 1792 prueba de pago.exe 30 PID 1792 wrote to memory of 2844 1792 prueba de pago.exe 30 PID 1792 wrote to memory of 2844 1792 prueba de pago.exe 30 PID 1792 wrote to memory of 2860 1792 prueba de pago.exe 31 PID 1792 wrote to memory of 2860 1792 prueba de pago.exe 31 PID 1792 wrote to memory of 2860 1792 prueba de pago.exe 31 PID 1792 wrote to memory of 2860 1792 prueba de pago.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\prueba de pago.exe"C:\Users\Admin\AppData\Local\Temp\prueba de pago.exe"1⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\prueba de pago.exe"C:\Users\Admin\AppData\Local\Temp\prueba de pago.exe"2⤵PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 4922⤵
- Program crash
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57399323923e3946fe9140132ac388132
SHA1728257d06c452449b1241769b459f091aabcffc5
SHA2565a1c20a3e2e2eb182976977669f2c5d9f3104477e98f74d69d2434e79b92fdc3
SHA512d6f28ba761351f374ae007c780be27758aea7b9f998e2a88a542eede459d18700adffe71abcb52b8a8c00695efb7ccc280175b5eeb57ca9a645542edfabb64f1