Overview
overview
7Static
static
3@!File_202...�#.rar
windows7-x64
3@!File_202...�#.rar
windows10-2004-x64
7resources.pak
windows7-x64
3resources.pak
windows10-2004-x64
3x64/Templa...la.xml
windows7-x64
1x64/Templa...la.xml
windows10-2004-x64
1x64/Templa...EC.xml
windows7-x64
1x64/Templa...EC.xml
windows10-2004-x64
1x64/Templa...te.xml
windows7-x64
1x64/Templa...te.xml
windows10-2004-x64
1x64/Templa...os.rpt
windows7-x64
3x64/Templa...os.rpt
windows10-2004-x64
3x64/Templa...nt.xml
windows7-x64
x64/Templa...nt.xml
windows10-2004-x64
1x64/Templa...s_.xml
windows7-x64
1x64/Templa...s_.xml
windows10-2004-x64
1x64/Templa...ro.xml
windows7-x64
1x64/Templa...ro.xml
windows10-2004-x64
1x64/Templa...ia.xml
windows7-x64
1x64/Templa...ia.xml
windows10-2004-x64
1x64/Templa...te.htm
windows7-x64
1x64/Templa...te.htm
windows10-2004-x64
1x64/plugin...ns.dll
windows7-x64
1x64/plugin...ns.dll
windows10-2004-x64
1x64/plugin...ns.dll
windows7-x64
1x64/plugin...ns.dll
windows10-2004-x64
1x64/plugin...ns.dll
windows7-x64
1x64/plugin...ns.dll
windows10-2004-x64
1x64/plugin...ns.dll
windows7-x64
1x64/plugin...ns.dll
windows10-2004-x64
1x64/plugin...re.dll
windows7-x64
1x64/plugin...re.dll
windows10-2004-x64
1Analysis
-
max time kernel
138s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 12:19
Static task
static1
Behavioral task
behavioral1
Sample
@!File_2024_ṔḁṨṨẄṏṛḒ#.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
@!File_2024_ṔḁṨṨẄṏṛḒ#.rar
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
resources.pak
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
resources.pak
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
x64/Templates/Caratula.xml
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
x64/Templates/Caratula.xml
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
x64/Templates/CaratulaAEC.xml
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
x64/Templates/CaratulaAEC.xml
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
x64/Templates/CaratulaLibrosDte.xml
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
x64/Templates/CaratulaLibrosDte.xml
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
x64/Templates/ConfigComplementos.rpt
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
x64/Templates/ConfigComplementos.rpt
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
x64/Templates/DTECompraInt.xml
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
x64/Templates/DTECompraInt.xml
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
x64/Templates/DTEReportes_.xml
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
x64/Templates/DTEReportes_.xml
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
x64/Templates/DetalleLibro.xml
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
x64/Templates/DetalleLibro.xml
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
x64/Templates/DetalleLibroGuia.xml
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
x64/Templates/DetalleLibroGuia.xml
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
x64/Templates/TemplateCorreoCliente.htm
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
x64/Templates/TemplateCorreoCliente.htm
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
x64/plugins/MahApps.Metro.IconPacks.BootstrapIcons.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
x64/plugins/MahApps.Metro.IconPacks.BootstrapIcons.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
x64/plugins/MahApps.Metro.IconPacks.BoxIcons.dll
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
x64/plugins/MahApps.Metro.IconPacks.BoxIcons.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral27
Sample
x64/plugins/MahApps.Metro.IconPacks.Codicons.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
x64/plugins/MahApps.Metro.IconPacks.Codicons.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral29
Sample
x64/plugins/MahApps.Metro.IconPacks.Coolicons.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
x64/plugins/MahApps.Metro.IconPacks.Coolicons.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral31
Sample
x64/plugins/MahApps.Metro.IconPacks.Core.dll
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
x64/plugins/MahApps.Metro.IconPacks.Core.dll
Resource
win10v2004-20240221-en
General
-
Target
@!File_2024_ṔḁṨṨẄṏṛḒ#.rar
-
Size
22.1MB
-
MD5
c43807cf5f333c58b4e0d007fd3d6a10
-
SHA1
ec2769974494035f47bb924fcd41487753f88af7
-
SHA256
5daea0e236791d060252b4e08b7c5e287d448891187ea0ca2b802e4ea1af9834
-
SHA512
2e6a0991206b0baa8192ff08f9c068a7151e7c283aeab9483ab58aef105a4b9fb1338f0f209493abb87cbcc3a12a7fa79cf51c2dfdacfd71a4dcd529fa27bcf0
-
SSDEEP
393216:YXCAx/4rI0Tj4Q6FVVcmT5OIWxzbO4jvRV/ltcCSL8V8sp4ZzKyractX6LLc:lqqkQ6FVVcmTQFxz5vRZ/v3V99Ok4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3538781373-1545967067-4263767959-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3538781373-1545967067-4263767959-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2248 7zFM.exe Token: 35 2248 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 7zFM.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2248 1356 cmd.exe 95 PID 1356 wrote to memory of 2248 1356 cmd.exe 95
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\@!File_2024_ṔḁṨṨẄṏṛḒ#.rar1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\@!File_2024_ṔḁṨṨẄṏṛḒ#.rar"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2248
-