Overview
overview
10Static
static
15 NOTIFICA......exe
windows7-x64
105 NOTIFICA......exe
windows10-2004-x64
105 NOTIFICA...er.dll
windows7-x64
15 NOTIFICA...er.dll
windows10-2004-x64
15 NOTIFICA...20.dll
windows7-x64
15 NOTIFICA...20.dll
windows10-2004-x64
15 NOTIFICA...20.dll
windows7-x64
15 NOTIFICA...20.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 15:51
Static task
static1
Behavioral task
behavioral1
Sample
5 NOTIFICACION DEMANDA/5 NOTIFICACION DEMANDA...exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5 NOTIFICACION DEMANDA/5 NOTIFICACION DEMANDA...exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
5 NOTIFICACION DEMANDA/Register.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
5 NOTIFICACION DEMANDA/Register.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
5 NOTIFICACION DEMANDA/rtl120.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
5 NOTIFICACION DEMANDA/rtl120.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
5 NOTIFICACION DEMANDA/vcl120.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
5 NOTIFICACION DEMANDA/vcl120.dll
Resource
win10v2004-20240226-en
General
-
Target
5 NOTIFICACION DEMANDA/5 NOTIFICACION DEMANDA...exe
-
Size
135KB
-
MD5
a2d70fbab5181a509369d96b682fc641
-
SHA1
22afcdc180400c4d2b9e5a6db2b8a26bff54dd38
-
SHA256
8aed681ad8d660257c10d2f0e85ae673184055a341901643f27afc38e5ef8473
-
SHA512
219c6e7e88004fad9f4392be9a852c58fc43b7f6900e40370991427f37eaea5c18f48d2954f9479dde8bcb787345f4e292d5620add8224aec4d93d7968820b83
-
SSDEEP
1536:URLRDTAC1CMoR1CqabJWt7AQFYMGhw1ScCD28v2Vv428fmvxOuw03h9VC:URdV1CMoiqadTQFBGhw1ED28+94hGw
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
TRACKMONEY
trackmoney.dynuddns.net:5959
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1912 set thread context of 2896 1912 5 NOTIFICACION DEMANDA...exe 28 PID 2896 set thread context of 2796 2896 cmd.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1912 5 NOTIFICACION DEMANDA...exe 1912 5 NOTIFICACION DEMANDA...exe 2896 cmd.exe 2896 cmd.exe 2796 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1912 5 NOTIFICACION DEMANDA...exe 2896 cmd.exe 2896 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2796 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2796 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2896 1912 5 NOTIFICACION DEMANDA...exe 28 PID 1912 wrote to memory of 2896 1912 5 NOTIFICACION DEMANDA...exe 28 PID 1912 wrote to memory of 2896 1912 5 NOTIFICACION DEMANDA...exe 28 PID 1912 wrote to memory of 2896 1912 5 NOTIFICACION DEMANDA...exe 28 PID 1912 wrote to memory of 2896 1912 5 NOTIFICACION DEMANDA...exe 28 PID 2896 wrote to memory of 2796 2896 cmd.exe 30 PID 2896 wrote to memory of 2796 2896 cmd.exe 30 PID 2896 wrote to memory of 2796 2896 cmd.exe 30 PID 2896 wrote to memory of 2796 2896 cmd.exe 30 PID 2896 wrote to memory of 2796 2896 cmd.exe 30 PID 2896 wrote to memory of 2796 2896 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5 NOTIFICACION DEMANDA\5 NOTIFICACION DEMANDA...exe"C:\Users\Admin\AppData\Local\Temp\5 NOTIFICACION DEMANDA\5 NOTIFICACION DEMANDA...exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
741KB
MD5871f132387acaa4a3f6e16c8c44b7ffc
SHA17ef07fda06ea0fd1dcc59278546ae8ec4d1de42f
SHA256754e726c1abcd7a896f2c2c38b096fd8eb174107a7748aec3d41ae436fdd07e2
SHA512a214ce80395ea843cc6ae3c98f18573573be70d8a849a5db66ccbe6514a5637fa86b5f1b74d3716010613cfa6c2d1866af2b3857dee1318962828593dec7ee08