Overview
overview
10Static
static
301 PROCESO...AL.exe
windows7-x64
1001 PROCESO...AL.exe
windows10-2004-x64
1001 PROCESO...re.dll
windows7-x64
101 PROCESO...re.dll
windows10-2004-x64
101 PROCESO...rk.dll
windows7-x64
101 PROCESO...rk.dll
windows10-2004-x64
101 PROCESO...64.dll
windows7-x64
101 PROCESO...64.dll
windows10-2004-x64
101 PROCESO...64.dll
windows7-x64
101 PROCESO...64.dll
windows10-2004-x64
101 PROCESO...40.dll
windows7-x64
101 PROCESO...40.dll
windows10-2004-x64
101 PROCESO..._1.dll
windows7-x64
101 PROCESO..._1.dll
windows10-2004-x64
101 PROCESO...64.dll
windows7-x64
101 PROCESO...64.dll
windows10-2004-x64
101 PROCESO...40.dll
windows7-x64
101 PROCESO...40.dll
windows10-2004-x64
101 PROCESO..._1.dll
windows7-x64
101 PROCESO..._1.dll
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
01 PROCESO JUDICIAL EN SU CONTRA/01 01 PROCESO JUDICIAL.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
01 PROCESO JUDICIAL EN SU CONTRA/01 01 PROCESO JUDICIAL.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
01 PROCESO JUDICIAL EN SU CONTRA/Qt5Core.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
01 PROCESO JUDICIAL EN SU CONTRA/Qt5Core.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
01 PROCESO JUDICIAL EN SU CONTRA/Qt5Network.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
01 PROCESO JUDICIAL EN SU CONTRA/Qt5Network.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
01 PROCESO JUDICIAL EN SU CONTRA/libcrypto-1_1-x64.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
01 PROCESO JUDICIAL EN SU CONTRA/libcrypto-1_1-x64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
01 PROCESO JUDICIAL EN SU CONTRA/libssl-1_1-x64.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
01 PROCESO JUDICIAL EN SU CONTRA/libssl-1_1-x64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
01 PROCESO JUDICIAL EN SU CONTRA/msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
01 PROCESO JUDICIAL EN SU CONTRA/msvcp140.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
01 PROCESO JUDICIAL EN SU CONTRA/msvcp140_1.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
01 PROCESO JUDICIAL EN SU CONTRA/msvcp140_1.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
01 PROCESO JUDICIAL EN SU CONTRA/steam_api64.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
01 PROCESO JUDICIAL EN SU CONTRA/steam_api64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
01 PROCESO JUDICIAL EN SU CONTRA/vcruntime140.dll
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
01 PROCESO JUDICIAL EN SU CONTRA/vcruntime140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
01 PROCESO JUDICIAL EN SU CONTRA/vcruntime140_1.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
01 PROCESO JUDICIAL EN SU CONTRA/vcruntime140_1.dll
Resource
win10v2004-20240226-en
General
-
Target
01 PROCESO JUDICIAL EN SU CONTRA/01 01 PROCESO JUDICIAL.exe
-
Size
5.4MB
-
MD5
ad2735f096925010a53450cb4178c89e
-
SHA1
c6d65163c6315a642664f4eaec0fae9528549bfe
-
SHA256
4e775b5fafb4e6d89a4694f8694d2b8b540534bd4a52ff42f70095f1c929160e
-
SHA512
1868b22a7c5cba89545b06f010c09c5418b3d86039099d681eee9567c47208fdba3b89c6251cf03c964c58c805280d45ba9c3533125f6bd3e0bc067477e03ab9
-
SSDEEP
98304:o/zx+riUDpJowboU+XEsumY2XW6jBYeZ1ER:2x+riUDwUj12X1tY5
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
miguel2024.kozow.com:2020
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
01 01 PROCESO JUDICIAL.execmd.exedescription pid process target process PID 3192 set thread context of 3220 3192 01 01 PROCESO JUDICIAL.exe cmd.exe PID 3220 set thread context of 4888 3220 cmd.exe MSBuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\makemake.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
01 01 PROCESO JUDICIAL.execmd.exeMSBuild.exepid process 3192 01 01 PROCESO JUDICIAL.exe 3192 01 01 PROCESO JUDICIAL.exe 3220 cmd.exe 3220 cmd.exe 4888 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
01 01 PROCESO JUDICIAL.execmd.exepid process 3192 01 01 PROCESO JUDICIAL.exe 3220 cmd.exe 3220 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 4888 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 4888 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
01 01 PROCESO JUDICIAL.execmd.exedescription pid process target process PID 3192 wrote to memory of 3220 3192 01 01 PROCESO JUDICIAL.exe cmd.exe PID 3192 wrote to memory of 3220 3192 01 01 PROCESO JUDICIAL.exe cmd.exe PID 3192 wrote to memory of 3220 3192 01 01 PROCESO JUDICIAL.exe cmd.exe PID 3192 wrote to memory of 3220 3192 01 01 PROCESO JUDICIAL.exe cmd.exe PID 3220 wrote to memory of 4888 3220 cmd.exe MSBuild.exe PID 3220 wrote to memory of 4888 3220 cmd.exe MSBuild.exe PID 3220 wrote to memory of 4888 3220 cmd.exe MSBuild.exe PID 3220 wrote to memory of 4888 3220 cmd.exe MSBuild.exe PID 3220 wrote to memory of 4888 3220 cmd.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01 PROCESO JUDICIAL EN SU CONTRA\01 01 PROCESO JUDICIAL.exe"C:\Users\Admin\AppData\Local\Temp\01 PROCESO JUDICIAL EN SU CONTRA\01 01 PROCESO JUDICIAL.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
774KB
MD55f71f2d4759aa4bdf2e28762dd7cd995
SHA18750d2125241254be998272d441e2318e74f8b71
SHA2565a29aea3e164bd7ded2909183e29314bad41907b594f3864952d2fe297bb69bc
SHA512270f15e95709a534ef8d50760653f2a3cc802e76d50053e35a675330ceeb0dc97f1626008c0a6f432b47bf505730dfa9774f9f29874c08eda8697966413cf921