Overview
overview
10Static
static
101 NOTIFIC......exe
windows7-x64
1001 NOTIFIC......exe
windows10-2004-x64
1001 NOTIFIC...er.dll
windows7-x64
101 NOTIFIC...er.dll
windows10-2004-x64
101 NOTIFIC...ge.ogg
windows7-x64
101 NOTIFIC...ge.ogg
windows10-2004-x64
701 NOTIFIC...or.psd
windows7-x64
301 NOTIFIC...or.psd
windows10-2004-x64
301 NOTIFIC...20.dll
windows7-x64
101 NOTIFIC...20.dll
windows10-2004-x64
101 NOTIFIC...20.dll
windows7-x64
101 NOTIFIC...20.dll
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/01/2024, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
01 NOTIFICACION DEMANDA/01 NOTIFICACION DEMANDA....exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
01 NOTIFICACION DEMANDA/01 NOTIFICACION DEMANDA....exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
01 NOTIFICACION DEMANDA/Register.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
01 NOTIFICACION DEMANDA/Register.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
01 NOTIFICACION DEMANDA/breakage.ogg
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
01 NOTIFICACION DEMANDA/breakage.ogg
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
01 NOTIFICACION DEMANDA/fascinator.psd
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
01 NOTIFICACION DEMANDA/fascinator.psd
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
01 NOTIFICACION DEMANDA/rtl120.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
01 NOTIFICACION DEMANDA/rtl120.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
01 NOTIFICACION DEMANDA/vcl120.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
01 NOTIFICACION DEMANDA/vcl120.dll
Resource
win10v2004-20231215-en
General
-
Target
01 NOTIFICACION DEMANDA/fascinator.psd
-
Size
633KB
-
MD5
b5235767ba1ad2d53106727ea4c165e4
-
SHA1
017d9e13ed9f7b25f864341e92357116a6b07c3a
-
SHA256
c6e7629d113a64b4a32955df1ac57c15cbafb8aebd3157c11b93124cadd78583
-
SHA512
8022f30a202517c1b52cfa58617153901c5a0e6ed45d4373bc0b6e7250be7d60bee9961f257d1b73194805c370b9e007550d8a9c0d091457a0ea306a7790a1a4
-
SSDEEP
12288:hrcHzmmm6mXudkUGGlw7q/jDSL+2VFfbasTE:QvdkUBw72qPVdE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\psd_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\psd_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\psd_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.psd rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.psd\ = "psd_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\psd_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\psd_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\psd_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2836 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2836 AcroRd32.exe 2836 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2112 1808 cmd.exe 29 PID 1808 wrote to memory of 2112 1808 cmd.exe 29 PID 1808 wrote to memory of 2112 1808 cmd.exe 29 PID 2112 wrote to memory of 2836 2112 rundll32.exe 30 PID 2112 wrote to memory of 2836 2112 rundll32.exe 30 PID 2112 wrote to memory of 2836 2112 rundll32.exe 30 PID 2112 wrote to memory of 2836 2112 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\01 NOTIFICACION DEMANDA\fascinator.psd"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\01 NOTIFICACION DEMANDA\fascinator.psd2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\01 NOTIFICACION DEMANDA\fascinator.psd"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52c4e6e2e7bce9e4d9e33bc3b836e3e19
SHA1f7f0522eb755a59d6511fb57e73e54da95d9f8ae
SHA256357b79ca06656b2d515adbb9507b0b8c6c67ede7a30735ba077b4bb7c5a2ab09
SHA5126a0a5b9d56241620c089b8d17c1cc9e44890eb1370751a406791c41d3cb2c5f9d876f7d6a6498f665a7146a1bbe711d992ed84be186292726c9f194e4fbbbb42