Overview
overview
10Static
static
1JUZGADO PE...DA.exe
windows7-x64
10JUZGADO PE...DA.exe
windows10-2004-x64
10JUZGADO PE...i.pptx
windows7-x64
3JUZGADO PE...i.pptx
windows10-2004-x64
1JUZGADO PE...43.dll
windows7-x64
3JUZGADO PE...43.dll
windows10-2004-x64
3JUZGADO PE...t.xlsx
windows7-x64
3JUZGADO PE...t.xlsx
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
JUZGADO PENAL/07CITACION DE DEMANDA.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JUZGADO PENAL/07CITACION DE DEMANDA.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
JUZGADO PENAL/bikini.pptx
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
JUZGADO PENAL/bikini.pptx
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
JUZGADO PENAL/d3dx9_43.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
JUZGADO PENAL/d3dx9_43.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
JUZGADO PENAL/davit.xlsx
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
JUZGADO PENAL/davit.xlsx
Resource
win10v2004-20240802-en
General
-
Target
JUZGADO PENAL/bikini.pptx
-
Size
70KB
-
MD5
24fec7f3f13b3a944e02878b284cdd2f
-
SHA1
7e5d135c16e8d7558e18b778224fc55c3ac35d26
-
SHA256
64ce8379e4d91d2ba599e7b643399c67f6d256c8513feb97dc24c404ef752ea7
-
SHA512
7594696fb51916ee30855cc513f028bc491c62d63a524f43a2de89d661ca7fab58ae2cff6208aa50f8a4b8998dc89e8c512109a43cf9aca629a8a79ab257b080
-
SSDEEP
1536:WghD5gv2J3lzVYA3TmtFZ5LyGXqV1hJEHaBNskwdd7Uh8:WgQvIyPtF72zvhak0dd7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2124 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2124 POWERPNT.EXE 2124 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1576 2124 POWERPNT.EXE 30 PID 2124 wrote to memory of 1576 2124 POWERPNT.EXE 30 PID 2124 wrote to memory of 1576 2124 POWERPNT.EXE 30 PID 2124 wrote to memory of 1576 2124 POWERPNT.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\JUZGADO PENAL\bikini.pptx"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1576
-