Overview
overview
10Static
static
301 PROCESO...AL.exe
windows7-x64
1001 PROCESO...AL.exe
windows10-2004-x64
1001 PROCESO...re.dll
windows7-x64
101 PROCESO...re.dll
windows10-2004-x64
101 PROCESO...rk.dll
windows7-x64
101 PROCESO...rk.dll
windows10-2004-x64
101 PROCESO...64.dll
windows7-x64
101 PROCESO...64.dll
windows10-2004-x64
101 PROCESO...64.dll
windows7-x64
101 PROCESO...64.dll
windows10-2004-x64
101 PROCESO...40.dll
windows7-x64
101 PROCESO...40.dll
windows10-2004-x64
101 PROCESO..._1.dll
windows7-x64
101 PROCESO..._1.dll
windows10-2004-x64
101 PROCESO...64.dll
windows7-x64
101 PROCESO...64.dll
windows10-2004-x64
101 PROCESO...40.dll
windows7-x64
101 PROCESO...40.dll
windows10-2004-x64
101 PROCESO..._1.dll
windows7-x64
101 PROCESO..._1.dll
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
01 PROCESO JUDICIAL EN SU CONTRA/01 01 PROCESO JUDICIAL.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
01 PROCESO JUDICIAL EN SU CONTRA/01 01 PROCESO JUDICIAL.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
01 PROCESO JUDICIAL EN SU CONTRA/Qt5Core.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
01 PROCESO JUDICIAL EN SU CONTRA/Qt5Core.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
01 PROCESO JUDICIAL EN SU CONTRA/Qt5Network.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
01 PROCESO JUDICIAL EN SU CONTRA/Qt5Network.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
01 PROCESO JUDICIAL EN SU CONTRA/libcrypto-1_1-x64.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
01 PROCESO JUDICIAL EN SU CONTRA/libcrypto-1_1-x64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
01 PROCESO JUDICIAL EN SU CONTRA/libssl-1_1-x64.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
01 PROCESO JUDICIAL EN SU CONTRA/libssl-1_1-x64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
01 PROCESO JUDICIAL EN SU CONTRA/msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
01 PROCESO JUDICIAL EN SU CONTRA/msvcp140.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
01 PROCESO JUDICIAL EN SU CONTRA/msvcp140_1.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
01 PROCESO JUDICIAL EN SU CONTRA/msvcp140_1.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
01 PROCESO JUDICIAL EN SU CONTRA/steam_api64.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
01 PROCESO JUDICIAL EN SU CONTRA/steam_api64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
01 PROCESO JUDICIAL EN SU CONTRA/vcruntime140.dll
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
01 PROCESO JUDICIAL EN SU CONTRA/vcruntime140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
01 PROCESO JUDICIAL EN SU CONTRA/vcruntime140_1.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
01 PROCESO JUDICIAL EN SU CONTRA/vcruntime140_1.dll
Resource
win10v2004-20240226-en
General
-
Target
01 PROCESO JUDICIAL EN SU CONTRA/01 01 PROCESO JUDICIAL.exe
-
Size
5.4MB
-
MD5
ad2735f096925010a53450cb4178c89e
-
SHA1
c6d65163c6315a642664f4eaec0fae9528549bfe
-
SHA256
4e775b5fafb4e6d89a4694f8694d2b8b540534bd4a52ff42f70095f1c929160e
-
SHA512
1868b22a7c5cba89545b06f010c09c5418b3d86039099d681eee9567c47208fdba3b89c6251cf03c964c58c805280d45ba9c3533125f6bd3e0bc067477e03ab9
-
SSDEEP
98304:o/zx+riUDpJowboU+XEsumY2XW6jBYeZ1ER:2x+riUDwUj12X1tY5
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
miguel2024.kozow.com:2020
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
01 01 PROCESO JUDICIAL.execmd.exedescription pid process target process PID 2220 set thread context of 2252 2220 01 01 PROCESO JUDICIAL.exe cmd.exe PID 2252 set thread context of 2364 2252 cmd.exe MSBuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\makemake.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
01 01 PROCESO JUDICIAL.execmd.exeMSBuild.exepid process 2220 01 01 PROCESO JUDICIAL.exe 2220 01 01 PROCESO JUDICIAL.exe 2252 cmd.exe 2252 cmd.exe 2364 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
01 01 PROCESO JUDICIAL.execmd.exepid process 2220 01 01 PROCESO JUDICIAL.exe 2252 cmd.exe 2252 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 2364 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 2364 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
01 01 PROCESO JUDICIAL.execmd.exedescription pid process target process PID 2220 wrote to memory of 2252 2220 01 01 PROCESO JUDICIAL.exe cmd.exe PID 2220 wrote to memory of 2252 2220 01 01 PROCESO JUDICIAL.exe cmd.exe PID 2220 wrote to memory of 2252 2220 01 01 PROCESO JUDICIAL.exe cmd.exe PID 2220 wrote to memory of 2252 2220 01 01 PROCESO JUDICIAL.exe cmd.exe PID 2220 wrote to memory of 2252 2220 01 01 PROCESO JUDICIAL.exe cmd.exe PID 2252 wrote to memory of 2364 2252 cmd.exe MSBuild.exe PID 2252 wrote to memory of 2364 2252 cmd.exe MSBuild.exe PID 2252 wrote to memory of 2364 2252 cmd.exe MSBuild.exe PID 2252 wrote to memory of 2364 2252 cmd.exe MSBuild.exe PID 2252 wrote to memory of 2364 2252 cmd.exe MSBuild.exe PID 2252 wrote to memory of 2364 2252 cmd.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01 PROCESO JUDICIAL EN SU CONTRA\01 01 PROCESO JUDICIAL.exe"C:\Users\Admin\AppData\Local\Temp\01 PROCESO JUDICIAL EN SU CONTRA\01 01 PROCESO JUDICIAL.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2364
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
774KB
MD525afb48b6f0c014606c195eb1c4b7145
SHA11b9eada6873f773176adacc8e6aac0d594c98785
SHA25693131b6fc34381e51e8f27c12fc0b620d7ef0445a2ce6e8cc4d1c4f300932e48
SHA512120b1f0d696add239e50c4418650f5ddcbb8d43e69375c16ff68b33732c0d192f868a4c06e06f6125fa1f86d87a2c113d74efa48d3fcfd4e1589044b91d658de