Analysis

  • max time kernel
    206s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 16:21

General

  • Target

    COTIZACION #0024.pdf

  • Size

    172KB

  • MD5

    1920729f128f05542e9383110f8d6495

  • SHA1

    79d5d935b44e2cefe461e696b6e196837dae15d1

  • SHA256

    e4c1bf841484e83eaf1f43575d0c2a0d51cb05c6ebe0224a75ebd9742d712ec1

  • SHA512

    1cfbfef0ff42beb416e4610701bf195a87263708f9fbd576074c7231235acacb5aa8b27a54a942bc1019cb6e4162568ff5f1570a11962f515b139591166e3721

  • SSDEEP

    3072:kWw5x2P4d+G6Fr+3hrQKecv97qq9kIj52WuoLig88gkT9VFcpYE/3I:Bwqwd+hFQJeC97ZXfuoLiX8gkTbFboI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\COTIZACION #0024.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://is.gd/tDstSh
      2⤵
      • Modifies Internet Explorer Phishing Filter
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2492
      • C:\Program Files\7-Zip\7zFM.exe
        "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\10535698564.7z"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2216
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1588
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\10535698564\" -spe -an -ai#7zMap28185:82:7zEvent11728
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:496
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\10535698564\10535698564\" -spe -an -ai#7zMap20683:108:7zEvent6964
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1956
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\10535698564\10535698564\10535698564\" -spe -an -ai#7zMap30912:144:7zEvent6239
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2024
    • C:\Users\Admin\Downloads\10535698564\10535698564\10535698564\COTIZACION\COTIZACION.exe
      "C:\Users\Admin\Downloads\10535698564\10535698564\10535698564\COTIZACION\COTIZACION.exe"
      1⤵
      • Executes dropped EXE
      PID:1788
    • C:\Users\Admin\Downloads\10535698564\10535698564\10535698564\COTIZACION\COTIZACION.exe
      "C:\Users\Admin\Downloads\10535698564\10535698564\10535698564\COTIZACION\COTIZACION.exe"
      1⤵
      • Executes dropped EXE
      PID:748

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    1
    T1012

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      252B

      MD5

      c0b6eefcc187f3db7f8ff2ac1064d83b

      SHA1

      7ec604e7d92f74c975e51a916b95f9929ed1c61b

      SHA256

      8150255a24a5b5a1ec0e07b10d14955a731ba63070dd07f0cd8e30e5cc5f2a39

      SHA512

      9d8eef50e64ec0f9efb731139e53fb58b66427456c16669ca19754374fdfd8e20b4140044b29682abcf6fc13ed8834789a6830cd9b278f1cc9032d1166e91a5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ec45eea9299ea78e3b8ca5085532cf5d

      SHA1

      e3e1b23118162de7fd2da0851b2163bfb969f1d6

      SHA256

      8eb7b643ad81d7eb5335712f2284b1fed08c2d158a7c93c37f371cd504e97535

      SHA512

      91a421a15003c4187d67789639e11ad4d3f43797bbe59cce705871c59fd78d9c58c68151c8abe3fb13f8681ec87fb91f7a639d8b127a81e83ef642f7dc23e2df

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c8c2a75b4aa5fedc0656e0f9d331e4c9

      SHA1

      c2bccc8bfe7bca6e7c8c00a816687a980b533a8f

      SHA256

      f2b0aad4acb7b9e29a4f12445165131d7ec3b3e06d1e9c28159a4e8d695df232

      SHA512

      829e43c52ccf88eca129fb457fccb0c334dfde47b241fcfbcccadab662f1a70b83d5bb2ea52087caeec37d993ce23852596d7b917706d71745aa0fae92c798f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5a66d9b487026348b932936964b9aeaf

      SHA1

      49cf43b1da2927a97ad2189bb1b1bb07dc15dc0a

      SHA256

      d3be95e3ffa52a64633593c458dcc919d5c4d70c50744a09cd40351833d6e65d

      SHA512

      60912ca48392df66b116de5f48d22f220e6d3d8b155c746a475fd1b97273c51ed6c72b69bbfb9fc52f861ffd482b4e5bba0f97081fd860f79c7e49fe2511974c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      567d88f2bd8d128850ce61b61c531887

      SHA1

      aaa432992a12d64ae7d23c4e2afdcdd5108a946a

      SHA256

      a43c8dd38434534561e3083f184b652043b954b7434992feee35e7fbb1c3832b

      SHA512

      6f07ac4ce1cde0fb114f24d3ee0b750c2e3533a922d5052daec2bdeece7cda4b79a147e6ba1612062bb0fec6058276b91750ef689e7191e57f8e6badc250b454

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c7a1131cdc97c28184c16839942bfb09

      SHA1

      dd8fd8817799013356dfb3946945aa4b802ccd8d

      SHA256

      4333528ad56e259aef795103ce5703728963c2978d8afb3f52d7b8eaadccc636

      SHA512

      a521ccb2745b8440998a78f591a7eb211c0985e8f16ffb4df7749106805a6ea3882ef9def3b5ad93694c5ee5170b0a46cd903389ffc5b362edffca7f25044fe4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      52b509b1761b790a1b635b4434db0768

      SHA1

      831a47ab767bc913adcc82d9b52e75eab34c544b

      SHA256

      5968401e4c177501a05147f7155c2e579467aca876905789e938cce9d3c0717a

      SHA512

      d299d697a30077318c4042336d519bb78706c5de6b8c283dbd9597b0b785fe2a8b52b0213245ee1d4d3ee50974bbb202f974e8158cf2137dbbb100f52b801696

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      512f1de0e29c10ee7f7ec0116ed634b2

      SHA1

      46ea87ad5311c8124eedeb7faae7bcf5ad62827c

      SHA256

      d5ce43e87b10af73ab315d240a0c6d6d9f0bf333d0c660835f31ac19a01104c8

      SHA512

      2468d18f72367c2d5e9da228b6ac92e62a761048650575b62f9f1a7dbc270fbc62ddcc4dd8a4460f9f6a3c06110ea9490d4c1477be1fb3bbb586b93dcf890b54

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5adb43805a8c8db58b895f21006dce24

      SHA1

      d6ee5add06bf0150aae106312a4f4827b7edf68f

      SHA256

      a52c78f3bfc85cffe6a6ec1597f5c47c5bc37162000f91acf245bc6ad78548f9

      SHA512

      fad0debb76e9f2d4be7e10d58465c4b5f47f6975f9eaf07b64d5ed71b2a7a51d06b3937a678bd03750edc96537925f49ee738964fd4db430e58a34b4dbdd7ccf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5766e2ebc5c3f787214aef9760a631ad

      SHA1

      0a2fd8309cd27929cd075abf2ad4c8f55e5c52d8

      SHA256

      32c16b932aeb9e44982f5dffa6e6cd649e8a0a3430ae5d8ab375e29636c1d33d

      SHA512

      babcb5397b7d7a3f5cc33ca7524be74f4dfd4902dc470fa7c626f9716b2741dede9b4f91f5a373504901e0a587c55c5227b9b31b8d61093ee353b4fd32f7be00

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8367369f219d41510138950fb362f11a

      SHA1

      5703b9e9020198df08d7377000915b1640eee531

      SHA256

      0114bbe40716f99b30bc6f86dd258a8d7f887529a39d057b268da5d88ea53aff

      SHA512

      909efdb185c1ebbba3e97e43c79940570327f6b55d9dbff5b8976e471b5ae4b7bcf7a86c7c1685ed7751297a1a20158077c986d1f3a38104ee6f51d93a09a090

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      2d9346dbf9fd299de580e51fcf088e1d

      SHA1

      fbc07b16bbe590567488ad56f02c070e455b24dd

      SHA256

      c59ea1b63cbfc4d034bc47b04d46c4473bc33ae96c34fb40e5ed95a097a419d9

      SHA512

      ec477b61b89cca71f1cf3888382774b8ac3c3f7c5168b4211bf03ea5417d723474ef44ac29c104b41a289ad3cf9d0d3836609058ec397b70ef0f72c622950334

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\10535698564[1].7z
      Filesize

      11.8MB

      MD5

      e214871d206714e011f6acd2c47cd7ec

      SHA1

      5ebe91087e123cf53c76793ba1dbc666be14f5da

      SHA256

      2b72b122df6bca40db85d90be1cbf3a9a59fc5165ecd6b0a0d83b2c9751cb4c2

      SHA512

      757b1020fbe5d8148b249b6e387e627964c027837a5a54ed269f720662939eab95de1519c90abadad2864579b8738b95c607811ca7b517df37cc783e0ee7bc3d

    • C:\Users\Admin\AppData\Local\Temp\Cab33EC.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar33EF.tmp
      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\Tar39AF.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
      Filesize

      3KB

      MD5

      008abf16a90d3ac298c2ca03b9147281

      SHA1

      628cf3862f0ad5ffa0d4128d100e978c0b3d0590

      SHA256

      a2ba7ef46be46d7cc6560f0bfdf2b3543ad5ad6400c5ee19df284c53062777f3

      SHA512

      bc6de6c2cdeb33d414067cc7bd0ff391921b35252b6096f00a8446e3875a902ae7ee53fc5b23049419160cbd2a5bab8356a5198180c93d01eca6eb97a34fff70

    • C:\Users\Admin\Downloads\10535698564\10535698564.rar
      Filesize

      11.8MB

      MD5

      28a50e40edc8170289fae31f8dd0b527

      SHA1

      3086f2d959bc92acef69971cdcf9162ea0054db4

      SHA256

      e51ef616eb550adc6d8cbe7e2a65829ad14888be1f72e9c5c7ea760367f1433f

      SHA512

      654643e52b5af1bb47845902a24a8a22582e78cbe79276a162112274bc02bec5f8e357b77c96b29c966ff3316e562c79187352403ee60cd9bf721ed04134f249

    • C:\Users\Admin\Downloads\10535698564\10535698564\10535698564.part1.rar
      Filesize

      7.6MB

      MD5

      6202577cd342dead8dbf6635f4a0e54e

      SHA1

      569a3d4cd284f1e87775d4fe2a62a59749cfa9b9

      SHA256

      def1a73975e982d2a6d14a8117cbf6761362cf961558e9646cdbdb88b8791f72

      SHA512

      1dfdae75e74ac5e0a462da5b4d5f8e46e2c132ec83bb05a53d10d6aec8f7a35852517a13fb87ccb04297042f87d5058bffcdf1cdcc3890d3bece6a6b7d00508b

    • C:\Users\Admin\Downloads\10535698564\10535698564\10535698564.part2.rar
      Filesize

      4.2MB

      MD5

      4c48fb2d88ebe40bb12a20067ddce256

      SHA1

      01ac2601a2d0c041672612bdbb87b9923570106d

      SHA256

      edc9604dc74a6acc670a2bbe39386ca8ef69b9fd00371fa87bc82923bc4f8210

      SHA512

      61cf514722736cfa3f092731befa33e172f2e60018c9ef157a700d4164f2d8ec4729d870da9b30d36cbe7252dd2d2b1825ce59d604e45ded5c21c53b12112ccb

    • C:\Users\Admin\Downloads\10535698564\10535698564\10535698564\COTIZACION\COTIZACION.exe
      Filesize

      16.0MB

      MD5

      423b8988ac264ac88a1dea917a3bf73c

      SHA1

      6a512188ad8d46e6e97447c2b49070c9adc9c074

      SHA256

      2265227742151f391e9fcc2d95efe8f2999aaf1380a02b2a25795a75df209887

      SHA512

      684107bee6c29811a7af0c7a115f9780fd72554893723ba21bf7c1fa2b470aa2b08f30589d8741d68dcebc3848af0db60992edd625e4fa52e79b8a05ed6c7915

    • memory/748-668-0x0000000000260000-0x0000000000261000-memory.dmp
      Filesize

      4KB

    • memory/748-670-0x0000000000400000-0x000000000140D000-memory.dmp
      Filesize

      16.1MB

    • memory/1788-663-0x00000000001B0000-0x00000000001B1000-memory.dmp
      Filesize

      4KB

    • memory/1788-664-0x0000000000400000-0x000000000140D000-memory.dmp
      Filesize

      16.1MB

    • memory/1788-666-0x0000000000400000-0x000000000140D000-memory.dmp
      Filesize

      16.1MB

    • memory/1788-669-0x0000000000400000-0x000000000140D000-memory.dmp
      Filesize

      16.1MB

    • memory/1788-671-0x0000000000400000-0x000000000140D000-memory.dmp
      Filesize

      16.1MB