Overview
overview
10Static
static
101 PROCESO...AL.exe
windows7-x64
1001 PROCESO...AL.exe
windows10-2004-x64
1001 PROCESO...c_.dll
windows7-x64
101 PROCESO...c_.dll
windows10-2004-x64
101 PROCESO...m_.dll
windows7-x64
101 PROCESO...m_.dll
windows10-2004-x64
101 PROCESO...t_.dll
windows7-x64
101 PROCESO...t_.dll
windows10-2004-x64
101 PROCESO...ep.rar
windows7-x64
301 PROCESO...ep.rar
windows10-2004-x64
301 PROCESO...20.dll
windows7-x64
101 PROCESO...20.dll
windows10-2004-x64
101 PROCESO...ia.yml
windows7-x64
301 PROCESO...ia.yml
windows10-2004-x64
301 PROCESO...20.dll
windows7-x64
101 PROCESO...20.dll
windows10-2004-x64
101 PROCESO...20.dll
windows7-x64
301 PROCESO...20.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 22:28
Static task
static1
Behavioral task
behavioral1
Sample
01 PROCESO JUDICIAL/01 PROCESO JUDICIAL.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
01 PROCESO JUDICIAL/01 PROCESO JUDICIAL.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
01 PROCESO JUDICIAL/madbasic_.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
01 PROCESO JUDICIAL/madbasic_.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
01 PROCESO JUDICIAL/maddisAsm_.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
01 PROCESO JUDICIAL/maddisAsm_.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
01 PROCESO JUDICIAL/madexcept_.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
01 PROCESO JUDICIAL/madexcept_.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
01 PROCESO JUDICIAL/onestep.rar
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
01 PROCESO JUDICIAL/onestep.rar
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
01 PROCESO JUDICIAL/rtl120.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
01 PROCESO JUDICIAL/rtl120.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
01 PROCESO JUDICIAL/urticaria.yml
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
01 PROCESO JUDICIAL/urticaria.yml
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
01 PROCESO JUDICIAL/vcl120.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
01 PROCESO JUDICIAL/vcl120.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
01 PROCESO JUDICIAL/vclx120.dll
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
01 PROCESO JUDICIAL/vclx120.dll
Resource
win10v2004-20240508-en
General
-
Target
01 PROCESO JUDICIAL/onestep.rar
-
Size
646KB
-
MD5
3b0d1f17f9e0364574d4d252ac05206c
-
SHA1
58c2136529363b08b7b407692de402fa4e675177
-
SHA256
89079b6d4816236926c38318ac53a0177b5684ffd11ae388a2963158c0722506
-
SHA512
f469b5204528d5841aa5ff9e4eb1688a6bad181f350f352b2b645ae17df5a9a400275ef39573a3f0d701317751338bc8a07f1d51e4f652283e002a28b7201fae
-
SSDEEP
12288:dFnscV5vN0JaL9gyI2QSejbYWcLxM4OBNbf/UsgSU:DlJtRWjbjpWb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 2628 7zFM.exe Token: 35 2628 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid process 2628 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2936 wrote to memory of 2628 2936 cmd.exe 7zFM.exe PID 2936 wrote to memory of 2628 2936 cmd.exe 7zFM.exe PID 2936 wrote to memory of 2628 2936 cmd.exe 7zFM.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\01 PROCESO JUDICIAL\onestep.rar"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\01 PROCESO JUDICIAL\onestep.rar"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow