Overview
overview
1Static
static
1OEBPS/Text...s.html
windows7-x64
1OEBPS/Text...s.html
windows10-2004-x64
1OEBPS/Text/autor.html
windows7-x64
1OEBPS/Text/autor.html
windows10-2004-x64
1OEBPS/Text...1.html
windows7-x64
1OEBPS/Text...1.html
windows10-2004-x64
1OEBPS/Text...2.html
windows7-x64
1OEBPS/Text...2.html
windows10-2004-x64
1OEBPS/Text...3.html
windows7-x64
1OEBPS/Text...3.html
windows10-2004-x64
1OEBPS/Text...4.html
windows7-x64
1OEBPS/Text...4.html
windows10-2004-x64
1OEBPS/Text...5.html
windows7-x64
1OEBPS/Text...5.html
windows10-2004-x64
1OEBPS/Text...6.html
windows7-x64
1OEBPS/Text...6.html
windows10-2004-x64
1OEBPS/Text...7.html
windows7-x64
1OEBPS/Text...7.html
windows10-2004-x64
1OEBPS/Text...8.html
windows7-x64
1OEBPS/Text...8.html
windows10-2004-x64
1OEBPS/Text...9.html
windows7-x64
1OEBPS/Text...9.html
windows10-2004-x64
1OEBPS/Text...a.html
windows7-x64
1OEBPS/Text...a.html
windows10-2004-x64
1OEBPS/Text...a.html
windows7-x64
1OEBPS/Text...a.html
windows10-2004-x64
1OEBPS/Text/info.html
windows7-x64
1OEBPS/Text/info.html
windows10-2004-x64
1OEBPS/Text...n.html
windows7-x64
1OEBPS/Text...n.html
windows10-2004-x64
1OEBPS/Text...s.html
windows7-x64
1OEBPS/Text...s.html
windows10-2004-x64
1Analysis
-
max time kernel
196s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
OEBPS/Text/agradecimientos.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
OEBPS/Text/agradecimientos.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
OEBPS/Text/autor.html
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
OEBPS/Text/autor.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
OEBPS/Text/capitulo_1.html
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
OEBPS/Text/capitulo_1.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
OEBPS/Text/capitulo_2.html
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
OEBPS/Text/capitulo_2.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
OEBPS/Text/capitulo_3.html
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
OEBPS/Text/capitulo_3.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
OEBPS/Text/capitulo_4.html
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
OEBPS/Text/capitulo_4.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
OEBPS/Text/capitulo_5.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
OEBPS/Text/capitulo_5.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
OEBPS/Text/capitulo_6.html
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
OEBPS/Text/capitulo_6.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
OEBPS/Text/capitulo_7.html
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
OEBPS/Text/capitulo_7.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
OEBPS/Text/capitulo_8.html
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
OEBPS/Text/capitulo_8.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
OEBPS/Text/capitulo_9.html
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
OEBPS/Text/capitulo_9.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
OEBPS/Text/cubierta.html
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
OEBPS/Text/cubierta.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
OEBPS/Text/dedicatoria.html
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
OEBPS/Text/dedicatoria.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
OEBPS/Text/info.html
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
OEBPS/Text/info.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
OEBPS/Text/introduccion.html
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
OEBPS/Text/introduccion.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
OEBPS/Text/productos.html
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
OEBPS/Text/productos.html
Resource
win10v2004-20240709-en
General
-
Target
OEBPS/Text/capitulo_4.html
-
Size
26KB
-
MD5
c84f001043de292fb3cde60107b1e699
-
SHA1
62d68e8bedeff38bd13f7af255ad4bd138f2bf65
-
SHA256
17980d0c4384e316778b42e82595693da9f94f5db2e841f15d0e3fe60aa66a9d
-
SHA512
151c5800d378f01a2684002e4ba03f2e39b06026a0bfe15b2550a26766ea7046e27f382d090bf445e787cd68b9e57d6a075197f9ec6f4b86e5cc4804a7ce2698
-
SSDEEP
384:PTe1u5c5JP7UdW5J78ajHJ6ppkgEBn7kTkWqCQlZdpgfKV2F9VzJ0MJ3D:PK1u5c59oW5hTQpLEtKkVC4WKaVtpD
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000bdd651b45002e4fdfb02bd4ce0ac133981610c2d68562cfe619da2e08e9b6042000000000e800000000200002000000036e166464cd215d1d8ce7220a6282da397bf1fcf0a82d96e88637852265098f8200000005df0e5e37a6eb7113827e0b525bd59a92f356fe9b40f723257a34cb37b56907a400000000da0c9a3204f2b7a45dcbacbed1a7917da5142e40a12cca06d2b928fdaabbbde363501d77a89db0fb57c4d365eeafb7ed270ef63863a39b913afa6c11f0d728c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6DFD391-419D-11EF-9143-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203bdcbbaad5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427095060" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2732 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2732 AUDIODG.EXE Token: 33 2732 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2732 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2724 2548 iexplore.exe 29 PID 2548 wrote to memory of 2724 2548 iexplore.exe 29 PID 2548 wrote to memory of 2724 2548 iexplore.exe 29 PID 2548 wrote to memory of 2724 2548 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\OEBPS\Text\capitulo_4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5601⤵
- Suspicious use of AdjustPrivilegeToken
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502dda6146be15edbed78a020f45390f9
SHA1192aa09dece7ee2d584412099288dd92ac657107
SHA2560b98fd99dbe64e44a77f500689a8b6b12f52c83d5439c5f9272b92317ff1f72f
SHA512d06e3558650f528c7a9aa1443c44289691a38b48b7277cef74e2b5e0107445d242ec2552888ed558b4d22e06a45495186d02d9dcb14894eef9585986551996f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543206a108d30e62d2835f641abc9b3e0
SHA1d3c40926463cc2ebc11cf77a1040619f622c235a
SHA256e72061322a4e58a8525084101ae023f67703d4f859e2331d3773e949f24fb9d4
SHA5120a93cce03ab0d2f897b58c4abef614fea3edc05881bf89e0bb18ce0fb4e97dc67fbfe2188fafe751a969f5a6a3b403e1c74ae8af04c3304da26066066bccaf5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9983e68d013ebc26bed6772b043fc6
SHA10e0e076c644530c5a3761b7c7635b77d5cc3f4b2
SHA2563f1473e861a2c3dd796802f86a185ba4dfdb3c56187473863b8b5933e833ce89
SHA5126a7752f87b1f6c597eba2b8a1f3fba4ccdb071ef968ab436a84dc4436209b38c6155f0a15b75a7996aa14d7656d7d2eddfd0dcb56483feba827d93d3774ed92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0778588542fd963e1237b631cc72f48
SHA17a3febbfc082d7d934c53fa207140a2390d9d73b
SHA25643d0fe62c09ff3f8c8da97e61820f272e4a97ebde5f485526346c59c674e75c2
SHA512d5ff898c54ab2b424ed3d824bf5b3d5ea0cbfc7cd1ee16e04308e1d5d8ef258a13281b2543441a74e421cf0d6d7c76c6cafae84f1355804e901263df8b09bdce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58649e7d6e1006a1b6736806134744768
SHA163982554a06a1cb4b1651ca0b34b1e5e78dd71a1
SHA256cde4f65614d1a84d0c8010ab931e5314d64a970e9205e6cac0a9322b342a4fa1
SHA5124e6410aee91ddc50bead220d0feeb25171b26360c820cf9010025b50d2a8419e803470aa29f2699765bba10cff21979b8412bb86121e7c6cb962ee159cee2724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a8e71127d7fe4ad7e1e9a8d5f60ba6b
SHA1a724d7e50dc23dc030ab40c358c6546e9daa785d
SHA256776d5b5b027fb52fee958b290422457f2a3763d3d7b6d26f64c89e9f2bbdde69
SHA512467e55c777383a8326b6ecf2c144a444822cbfa8233dd84800d778df8f7c078622bfc70b6364fc633567259c67516706041895298ccdb57ad1228bb3abc15fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b990ef9d2e30d93f4816bf64ddca92e
SHA1ab931313bdf4a6cd2aa1eb8b944230557706cc56
SHA256268a500c782702d0e6ea822e4b18e593d4de563f0606c3b43c1db3c82ad2764c
SHA512732290f7bd8a2565e6616e8ddec12ca5578e3ba0ef0f11fbb3f76803d43cf907262390ae3d04eb91bacf51d7be5f0e8b188575b754c8e89606459fb7117323ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d643c82d08cbd217ee55a372e16e8b
SHA1bce0fda24d399b75bf9296add0f37a3e611d1327
SHA25668c13005a0ca715e9dbe37acf379da4ba7dbbadc31e94e43f6f59bd94c810ff9
SHA5123c2670d006e0e19c3e2c0eef76d08aaa028af99e5b92774762d2b9bdee999d61fd7adc6545c14ab12e13ba6a559b6aea8f62be37fb0cb922b5cdb4b4c6f0b656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2ad5a1839b7a9e8d724eedaa4d1ce19
SHA153e8a0c5ed2011a2ebd3284977ba61e24cea4926
SHA256d1d293d25470f851c9e17ec97b838671c7f59eeda4f9eab72236f751bd46d8f7
SHA5129073c475425948a7985d15762c1f82dc439c63da0ef6ab6c3e63a9a754d5911e86e80d6f57ae6b4adec4e81e10c855f67cdfa5c15f0652c936b7b228788c42b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b