Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
08-CITACION DEMANDA-JUZGADO PENAL 09- RAMA JUDICIAL ESPECIALIZADA/04 CITACION DEMANDA.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
08-CITACION DEMANDA-JUZGADO PENAL 09- RAMA JUDICIAL ESPECIALIZADA/04 CITACION DEMANDA.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
08-CITACION DEMANDA-JUZGADO PENAL 09- RAMA JUDICIAL ESPECIALIZADA/ProductStatistics3.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
08-CITACION DEMANDA-JUZGADO PENAL 09- RAMA JUDICIAL ESPECIALIZADA/ProductStatistics3.dll
Resource
win10v2004-20240802-en
General
-
Target
08-CITACION DEMANDA-JUZGADO PENAL 09- RAMA JUDICIAL ESPECIALIZADA/04 CITACION DEMANDA.exe
-
Size
3.8MB
-
MD5
27b6f3b8e8bdce591e5164edba28584d
-
SHA1
3a150c9db17a94feddec8268073336d030b97dad
-
SHA256
46d06d06984466e0e8082f8bba8d274c37145ec71f26da0904dd93ea2e7f3087
-
SHA512
f91aea8e4dc987703926fef287178fc680d450597ad524ea0ca44255c7e3e7127c5dce8362be2f241d7a7aace2b7760467bdfc6117ce467d2bc1459045bb842f
-
SSDEEP
49152:QDdgK6jyazbFza8IBn2cpi7cSgWVh07Z2GBc024xF6QKRTTzLAUd+JOugbW:+OK62azbMB2kZ2rUF6QKR3Vd+JAb
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
remotald.duckdns.org:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2296 set thread context of 2756 2296 04 CITACION DEMANDA.exe 30 PID 2756 set thread context of 2224 2756 cmd.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04 CITACION DEMANDA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2296 04 CITACION DEMANDA.exe 2296 04 CITACION DEMANDA.exe 2296 04 CITACION DEMANDA.exe 2296 04 CITACION DEMANDA.exe 2756 cmd.exe 2224 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2296 04 CITACION DEMANDA.exe 2756 cmd.exe 2756 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2224 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2224 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2756 2296 04 CITACION DEMANDA.exe 30 PID 2296 wrote to memory of 2756 2296 04 CITACION DEMANDA.exe 30 PID 2296 wrote to memory of 2756 2296 04 CITACION DEMANDA.exe 30 PID 2296 wrote to memory of 2756 2296 04 CITACION DEMANDA.exe 30 PID 2296 wrote to memory of 2756 2296 04 CITACION DEMANDA.exe 30 PID 2756 wrote to memory of 2224 2756 cmd.exe 32 PID 2756 wrote to memory of 2224 2756 cmd.exe 32 PID 2756 wrote to memory of 2224 2756 cmd.exe 32 PID 2756 wrote to memory of 2224 2756 cmd.exe 32 PID 2756 wrote to memory of 2224 2756 cmd.exe 32 PID 2756 wrote to memory of 2224 2756 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\08-CITACION DEMANDA-JUZGADO PENAL 09- RAMA JUDICIAL ESPECIALIZADA\04 CITACION DEMANDA.exe"C:\Users\Admin\AppData\Local\Temp\08-CITACION DEMANDA-JUZGADO PENAL 09- RAMA JUDICIAL ESPECIALIZADA\04 CITACION DEMANDA.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2224
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
780KB
MD5c400b56c0e6e96072a1f5f436f6a6e52
SHA1620561f3722d475f423479da70f97425d96f8ab3
SHA2566e7f09fb11b1ee65fcfd39b919fc8360d429d93664f8c575f089b43eca6212c4
SHA5120688c76b4c8b1d0a8a9294a736600f3101711bfdcb93ab509fcb85402423f26ae9df8d224598810ba164976a51f89ea4c710335829ed7f76420dd2ae23755129