Analysis
-
max time kernel
30s -
max time network
35s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
07-06-2024 13:23
Static task
static1
Behavioral task
behavioral1
Sample
64ba9228-a3fd-6c69-e273-6b61d84a5c85.eml
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
AmrepMexico-cotizaci�n.zip
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
b47d5d80fbe0aceaf399ab99a9b70d48.png
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
email-html-1.txt
Resource
win10-20240404-en
General
-
Target
64ba9228-a3fd-6c69-e273-6b61d84a5c85.eml
-
Size
1.1MB
-
MD5
85d31bf356996955ec66f428d543a284
-
SHA1
2e31369794b0d72ffc2d42c4ed361df991227d81
-
SHA256
a9bdeb82435feb9098f62681fec39eff00a7c2ee211cf85d1fd4218bc5d94d71
-
SHA512
6912aba06c895df957b072fea8a645a97cfae384afc0827451b80073c0ed3e2fb032ec0550dce493f8d04a253972b1e4563ca7c405835fd7a87cf97a3ceb1f92
-
SSDEEP
24576:G8RJxsIjGhTpPBNo9yFVwSU6DtUEis0utVm4T:GBpBNo9RSqcNT
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 952 OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 792 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 41 IoCs
pid Process 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 952 OpenWith.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe 792 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 952 wrote to memory of 792 952 OpenWith.exe 74 PID 952 wrote to memory of 792 952 OpenWith.exe 74 PID 952 wrote to memory of 792 952 OpenWith.exe 74 PID 792 wrote to memory of 4792 792 AcroRd32.exe 77 PID 792 wrote to memory of 4792 792 AcroRd32.exe 77 PID 792 wrote to memory of 4792 792 AcroRd32.exe 77 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 2652 4792 RdrCEF.exe 78 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79 PID 4792 wrote to memory of 1592 4792 RdrCEF.exe 79
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\64ba9228-a3fd-6c69-e273-6b61d84a5c85.eml1⤵
- Modifies registry class
PID:3052
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\64ba9228-a3fd-6c69-e273-6b61d84a5c85.eml"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=15D927E8BFA3818CF16F323B3AE0D074 --mojo-platform-channel-handle=1604 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2652
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=EDB52B9BF4713625BB5EC1B038FA5E55 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=EDB52B9BF4713625BB5EC1B038FA5E55 --renderer-client-id=2 --mojo-platform-channel-handle=1612 --allow-no-sandbox-job /prefetch:14⤵PID:1592
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8C517C6825D8A22590CD5260115F3E6C --mojo-platform-channel-handle=2196 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2996
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DF2C429619C387599AFEF89B2BE37F2E --mojo-platform-channel-handle=2292 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4816
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4EF8CD39B1EDCA5E6C83E158795BB8DE --mojo-platform-channel-handle=2304 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1416
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1CCE8896BEB76BAF440E0BA22B4B3C85 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1CCE8896BEB76BAF440E0BA22B4B3C85 --renderer-client-id=8 --mojo-platform-channel-handle=2380 --allow-no-sandbox-job /prefetch:14⤵PID:2012
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD59033885d938b7beb3d996be0b694c637
SHA162bbeef4949381da83d6239ecde3997244a916e5
SHA25685a02e4a22ed2b1fbcc61d8cc57584d817a41ea7ed98b47f58324662bc618d6c
SHA512ed39e8acb2a885c44d5ad95b46bde8099e7670855eb3ba51deb59445e718e455abd117044845bbf531974be07cfbebb0af69ce73fe7fde9b4c2a52c83cc158c1