Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-es -
resource tags
arch:x64arch:x86image:win7-20240508-eslocale:es-esos:windows7-x64systemwindows -
submitted
28-05-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
01 PROCESO JUDICIAL EN SU CONTRA/01 PROCESO JUDICIAL.exe
Resource
win7-20240508-es
General
-
Target
01 PROCESO JUDICIAL EN SU CONTRA/01 PROCESO JUDICIAL.exe
-
Size
2.3MB
-
MD5
5d52ef45b6e5bf144307a84c2af1581b
-
SHA1
414a899ec327d4a9daa53983544245b209f25142
-
SHA256
26a24d3b0206c6808615c7049859c2fe62c4dcd87e7858be40ae8112b0482616
-
SHA512
458f47c1e4ccf41edaacc57abb663ee77ca098fffc596fad941bbdea67653aeabc79b34d607078b9ee5adb45614e26f5c28a09e8faf9532081fdd5dec9ac3c48
-
SSDEEP
49152:DzO+g39FbI0eQf/Z3CarWedoYAmXviDTMtT2wkqN5K:DzO19Fnf/hdoYAm9ZkqN5K
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
Dios123.kozow.com:1234
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
01 PROCESO JUDICIAL.execmd.exedescription pid process target process PID 3008 set thread context of 3040 3008 01 PROCESO JUDICIAL.exe cmd.exe PID 3040 set thread context of 2552 3040 cmd.exe MSBuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\BMObeaconv1.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
01 PROCESO JUDICIAL.execmd.exeMSBuild.exepid process 3008 01 PROCESO JUDICIAL.exe 3008 01 PROCESO JUDICIAL.exe 3040 cmd.exe 3040 cmd.exe 2552 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
01 PROCESO JUDICIAL.execmd.exepid process 3008 01 PROCESO JUDICIAL.exe 3040 cmd.exe 3040 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 2552 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 2552 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
01 PROCESO JUDICIAL.execmd.exedescription pid process target process PID 3008 wrote to memory of 3040 3008 01 PROCESO JUDICIAL.exe cmd.exe PID 3008 wrote to memory of 3040 3008 01 PROCESO JUDICIAL.exe cmd.exe PID 3008 wrote to memory of 3040 3008 01 PROCESO JUDICIAL.exe cmd.exe PID 3008 wrote to memory of 3040 3008 01 PROCESO JUDICIAL.exe cmd.exe PID 3008 wrote to memory of 3040 3008 01 PROCESO JUDICIAL.exe cmd.exe PID 3040 wrote to memory of 2552 3040 cmd.exe MSBuild.exe PID 3040 wrote to memory of 2552 3040 cmd.exe MSBuild.exe PID 3040 wrote to memory of 2552 3040 cmd.exe MSBuild.exe PID 3040 wrote to memory of 2552 3040 cmd.exe MSBuild.exe PID 3040 wrote to memory of 2552 3040 cmd.exe MSBuild.exe PID 3040 wrote to memory of 2552 3040 cmd.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01 PROCESO JUDICIAL EN SU CONTRA\01 PROCESO JUDICIAL.exe"C:\Users\Admin\AppData\Local\Temp\01 PROCESO JUDICIAL EN SU CONTRA\01 PROCESO JUDICIAL.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
777KB
MD5e2cad048b9b84eac6cb89a9f65718d9a
SHA109c745e9dd7cb73f8a4a4acdddbb07d6f27e3840
SHA2565b0cdf15c0889f5e8d79b93aa4462b82fbc560e56536d221ead5aee50486c503
SHA5128859d89700d3dbf03ecc50e14ad4df541365e446767a6b6e960548d1e887e0c8c9286ec48b8f2c5309a459e370f9a1be7437889c00ed5f30c4fe0f9238d6274b