Overview
overview
10Static
static
303- PROCES...ITO.7z
windows7-x64
303- PROCES...ITO.7z
windows10-2004-x64
303- PROCES...DO.exe
windows7-x64
1003- PROCES...DO.exe
windows10-2004-x64
1003- PROCES...re.dll
windows7-x64
103- PROCES...re.dll
windows10-2004-x64
103- PROCES...rk.dll
windows7-x64
103- PROCES...rk.dll
windows10-2004-x64
103- PROCES...01.exe
windows7-x64
103- PROCES...01.exe
windows10-2004-x64
603- PROCES...gy.ini
windows7-x64
103- PROCES...gy.ini
windows10-2004-x64
103- PROCES...ge.dat
windows7-x64
303- PROCES...ge.dat
windows10-2004-x64
303- PROCES...64.dll
windows7-x64
103- PROCES...64.dll
windows10-2004-x64
103- PROCES...64.dll
windows7-x64
103- PROCES...64.dll
windows10-2004-x64
103- PROCES...40.dll
windows7-x64
103- PROCES...40.dll
windows10-2004-x64
103- PROCES..._1.dll
windows7-x64
103- PROCES..._1.dll
windows10-2004-x64
103- PROCES...64.dll
windows7-x64
103- PROCES...64.dll
windows10-2004-x64
103- PROCES...40.dll
windows7-x64
103- PROCES...40.dll
windows10-2004-x64
103- PROCES..._1.dll
windows7-x64
103- PROCES..._1.dll
windows10-2004-x64
1Resubmissions
30-05-2024 18:53
240530-xjnklagb6z 10Analysis
-
max time kernel
120s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO.7z
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO.7z
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/01 PROCESO JUDICIAL JUZGADO.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/01 PROCESO JUDICIAL JUZGADO.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/Qt5Core.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/Qt5Core.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/Qt5Network.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/Qt5Network.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/Winrar/7z2301.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/Winrar/7z2301.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/anesthesiology.ini
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/anesthesiology.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/badge.dat
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/badge.dat
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/libcrypto-1_1-x64.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/libcrypto-1_1-x64.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/libssl-1_1-x64.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/libssl-1_1-x64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/msvcp140.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/msvcp140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/msvcp140_1.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/msvcp140_1.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/steam_api64.dll
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/steam_api64.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/vcruntime140.dll
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/vcruntime140.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/vcruntime140_1.dll
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/vcruntime140_1.dll
Resource
win10v2004-20240508-en
General
-
Target
03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO/01 PROCESO JUDICIAL JUZGADO.exe
-
Size
5.4MB
-
MD5
ad2735f096925010a53450cb4178c89e
-
SHA1
c6d65163c6315a642664f4eaec0fae9528549bfe
-
SHA256
4e775b5fafb4e6d89a4694f8694d2b8b540534bd4a52ff42f70095f1c929160e
-
SHA512
1868b22a7c5cba89545b06f010c09c5418b3d86039099d681eee9567c47208fdba3b89c6251cf03c964c58c805280d45ba9c3533125f6bd3e0bc067477e03ab9
-
SSDEEP
98304:o/zx+riUDpJowboU+XEsumY2XW6jBYeZ1ER:2x+riUDwUj12X1tY5
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
enviofinal.kozow.com:5051
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
AnsyFelix
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
01 PROCESO JUDICIAL JUZGADO.execmd.exedescription pid process target process PID 2600 set thread context of 2664 2600 01 PROCESO JUDICIAL JUZGADO.exe cmd.exe PID 2664 set thread context of 960 2664 cmd.exe MSBuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\ValidAppv3.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
01 PROCESO JUDICIAL JUZGADO.execmd.exeMSBuild.exepid process 2600 01 PROCESO JUDICIAL JUZGADO.exe 2600 01 PROCESO JUDICIAL JUZGADO.exe 2664 cmd.exe 2664 cmd.exe 960 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
01 PROCESO JUDICIAL JUZGADO.execmd.exepid process 2600 01 PROCESO JUDICIAL JUZGADO.exe 2664 cmd.exe 2664 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 960 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 960 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
01 PROCESO JUDICIAL JUZGADO.execmd.exedescription pid process target process PID 2600 wrote to memory of 2664 2600 01 PROCESO JUDICIAL JUZGADO.exe cmd.exe PID 2600 wrote to memory of 2664 2600 01 PROCESO JUDICIAL JUZGADO.exe cmd.exe PID 2600 wrote to memory of 2664 2600 01 PROCESO JUDICIAL JUZGADO.exe cmd.exe PID 2600 wrote to memory of 2664 2600 01 PROCESO JUDICIAL JUZGADO.exe cmd.exe PID 2600 wrote to memory of 2664 2600 01 PROCESO JUDICIAL JUZGADO.exe cmd.exe PID 2664 wrote to memory of 960 2664 cmd.exe MSBuild.exe PID 2664 wrote to memory of 960 2664 cmd.exe MSBuild.exe PID 2664 wrote to memory of 960 2664 cmd.exe MSBuild.exe PID 2664 wrote to memory of 960 2664 cmd.exe MSBuild.exe PID 2664 wrote to memory of 960 2664 cmd.exe MSBuild.exe PID 2664 wrote to memory of 960 2664 cmd.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO\01 PROCESO JUDICIAL JUZGADO.exe"C:\Users\Admin\AppData\Local\Temp\03- PROCESO JUDICIAL JUZGADO CIVIL 02 DEL CIRCUITO\01 PROCESO JUDICIAL JUZGADO.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
774KB
MD5981edd5997b744f04a6624142b314233
SHA19ae85015c0d5b670fa4b3c5b26aaeee9bb8b2e71
SHA256e04909a0a2b70a7621736c89148f6e460d847984824eaa772cd08ca90eb1a867
SHA512014dab300c31fa042cfcf490e181b29ea63b74930fc2a768f7897d98189b5d8acbbdccc819234740315674fae42e45756416e76bd7109f6645d7e33fcc87512c