Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
SPAM por favor lea este correo electrónico.msg
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SPAM por favor lea este correo electrónico.msg
Resource
win10v2004-20240226-en
General
-
Target
SPAM por favor lea este correo electrónico.msg
-
Size
64KB
-
MD5
b04a49d03354245b575ab9601b753130
-
SHA1
5ad8eaeb0dce9c924049fdf8fdbc608818913e0f
-
SHA256
a018814019c75fe7f1fba6a7ef0186f7f668deb9bbab8bcf8e04c635940220cc
-
SHA512
dba639f65e36b29ba08d18eebc0c733a69282aa4b658593408ee2187014c73c586ba8661770c76012ee69a62489212d4ff5a835670feac96674daf3766f6b64f
-
SSDEEP
768:6zIO6cVODUahk48L5wM82O0aHJOrdwWsKCTWsKCWXxfO7N6DMfgE8kaJICTwr2sE:II3bkjuMO0UOKWMWZmVfgE1aJHw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\敲d OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\msg_auto_file\shell OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\篲NJ\ = "msg_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\msg_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\.msg OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\.msg\ = "msg_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\篲NJ OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\敲d\ = "msg_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\msg_auto_file\shell\Read\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\msg_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\msg_auto_file\shell\Read OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3920 OpenWith.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 3920 OpenWith.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe 468 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3920 wrote to memory of 468 3920 OpenWith.exe 98 PID 3920 wrote to memory of 468 3920 OpenWith.exe 98 PID 3920 wrote to memory of 468 3920 OpenWith.exe 98 PID 468 wrote to memory of 2988 468 AcroRd32.exe 101 PID 468 wrote to memory of 2988 468 AcroRd32.exe 101 PID 468 wrote to memory of 2988 468 AcroRd32.exe 101 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 2184 2988 RdrCEF.exe 102 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103 PID 2988 wrote to memory of 1716 2988 RdrCEF.exe 103
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\SPAM por favor lea este correo electrónico.msg"1⤵
- Modifies registry class
PID:1528
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SPAM por favor lea este correo electrónico.msg"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ACA007D18EBBC6D42E3D3634CA89D2BD --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2184
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E4D9E2323E2DC7ACA7C98C80E9F59944 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E4D9E2323E2DC7ACA7C98C80E9F59944 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:14⤵PID:1716
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=87B546B671E081FD713FB93EFB4F60D5 --mojo-platform-channel-handle=2192 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1604
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=13FFB611FB17D3F3B170993B2903C351 --mojo-platform-channel-handle=2340 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4036
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E4E3AC2F6C90E9297B9D9A0075A613AB --mojo-platform-channel-handle=2180 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1848
-
-
-