Analysis
-
max time kernel
195s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240404-es -
resource tags
arch:x64arch:x86image:win10-20240404-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
07/05/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
RV 684-CITACIÓN DEMANDA 02-JUZGADO 009 PENAL DEL CIRCUITO-84.msg
Resource
win10-20240404-es
Behavioral task
behavioral2
Sample
004-CITACION DEMANDA EN SU CONTRA -JUZGADO 008 CIVIL DEL CIRCUITO..docx (1).svg
Resource
win10-20240404-es
General
-
Target
RV 684-CITACIÓN DEMANDA 02-JUZGADO 009 PENAL DEL CIRCUITO-84.msg
-
Size
1.5MB
-
MD5
7c189e9a8b435132cd1f0f6e6304f879
-
SHA1
1d3ae5db2dd745021cc67bdcaaca32c22ec16976
-
SHA256
f92ad0f535ed6aac1972b9bb845cef324d03dfa8d371528c0b873778043a3b04
-
SHA512
7ae55f5a0879b72725b8884baf6f984c16f8c2fd7ae4cab94d938ef6b4bf0697025b9ca959e87c734e5d4e66a37844eec060fb7a67d530e99f6944590593d481
-
SSDEEP
24576:XVnuCvD5dEqQMnK6U8z2g1Vj/irXHIl5woW36xlxFr98:EqNKbg1Vj/6XHIl5wn+R58
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4984 OpenWith.exe -
Suspicious use of SetWindowsHookEx 49 IoCs
pid Process 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe 4984 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4984 wrote to memory of 1036 4984 OpenWith.exe 74 PID 4984 wrote to memory of 1036 4984 OpenWith.exe 74
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\RV 684-CITACIÓN DEMANDA 02-JUZGADO 009 PENAL DEL CIRCUITO-84.msg"1⤵
- Modifies registry class
PID:1372
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\RV 684-CITACIÓN DEMANDA 02-JUZGADO 009 PENAL DEL CIRCUITO-84.msg2⤵PID:1036
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1844