Overview
overview
10Static
static
1NOTIFICACI...DA.exe
windows7-x64
10NOTIFICACI...DA.exe
windows10-2004-x64
10NOTIFICACI...i.pptx
windows7-x64
3NOTIFICACI...i.pptx
windows10-2004-x64
1NOTIFICACI...43.dll
windows7-x64
3NOTIFICACI...43.dll
windows10-2004-x64
3NOTIFICACI...t.xlsx
windows7-x64
3NOTIFICACI...t.xlsx
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 19:36
Static task
static1
Behavioral task
behavioral1
Sample
NOTIFICACIONES DEMANDA JUDICIAL -JUZGADO 02 PROMISCUO. RAMA JUDICIAL/01-NOTIFICACION DEMANDA.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
NOTIFICACIONES DEMANDA JUDICIAL -JUZGADO 02 PROMISCUO. RAMA JUDICIAL/01-NOTIFICACION DEMANDA.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
NOTIFICACIONES DEMANDA JUDICIAL -JUZGADO 02 PROMISCUO. RAMA JUDICIAL/bikini.pptx
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
NOTIFICACIONES DEMANDA JUDICIAL -JUZGADO 02 PROMISCUO. RAMA JUDICIAL/bikini.pptx
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
NOTIFICACIONES DEMANDA JUDICIAL -JUZGADO 02 PROMISCUO. RAMA JUDICIAL/d3dx9_43.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
NOTIFICACIONES DEMANDA JUDICIAL -JUZGADO 02 PROMISCUO. RAMA JUDICIAL/d3dx9_43.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
NOTIFICACIONES DEMANDA JUDICIAL -JUZGADO 02 PROMISCUO. RAMA JUDICIAL/davit.xlsx
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
NOTIFICACIONES DEMANDA JUDICIAL -JUZGADO 02 PROMISCUO. RAMA JUDICIAL/davit.xlsx
Resource
win10v2004-20240802-en
General
-
Target
NOTIFICACIONES DEMANDA JUDICIAL -JUZGADO 02 PROMISCUO. RAMA JUDICIAL/01-NOTIFICACION DEMANDA.exe
-
Size
2.2MB
-
MD5
d9530ecee42acccfd3871672a511bc9e
-
SHA1
89b4d2406f1294bd699ef231a4def5f495f12778
-
SHA256
81e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280
-
SHA512
d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980
-
SSDEEP
49152:rHOut2Bf0ajIM8XEEN6N0rE/I/vqn7krQEQusd5F:VbaMbXbE/I/SnwrQEQusd/
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
melo2024.kozow.com:8000
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
AnsyFelix
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
01-NOTIFICACION DEMANDA.execmd.exedescription pid process target process PID 1248 set thread context of 4380 1248 01-NOTIFICACION DEMANDA.exe cmd.exe PID 4380 set thread context of 4700 4380 cmd.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
01-NOTIFICACION DEMANDA.execmd.exeMSBuild.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01-NOTIFICACION DEMANDA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
01-NOTIFICACION DEMANDA.execmd.exeMSBuild.exepid process 1248 01-NOTIFICACION DEMANDA.exe 1248 01-NOTIFICACION DEMANDA.exe 4380 cmd.exe 4380 cmd.exe 4700 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
01-NOTIFICACION DEMANDA.execmd.exepid process 1248 01-NOTIFICACION DEMANDA.exe 4380 cmd.exe 4380 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 4700 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 4700 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
01-NOTIFICACION DEMANDA.execmd.exedescription pid process target process PID 1248 wrote to memory of 4380 1248 01-NOTIFICACION DEMANDA.exe cmd.exe PID 1248 wrote to memory of 4380 1248 01-NOTIFICACION DEMANDA.exe cmd.exe PID 1248 wrote to memory of 4380 1248 01-NOTIFICACION DEMANDA.exe cmd.exe PID 1248 wrote to memory of 4380 1248 01-NOTIFICACION DEMANDA.exe cmd.exe PID 4380 wrote to memory of 4700 4380 cmd.exe MSBuild.exe PID 4380 wrote to memory of 4700 4380 cmd.exe MSBuild.exe PID 4380 wrote to memory of 4700 4380 cmd.exe MSBuild.exe PID 4380 wrote to memory of 4700 4380 cmd.exe MSBuild.exe PID 4380 wrote to memory of 4700 4380 cmd.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NOTIFICACIONES DEMANDA JUDICIAL -JUZGADO 02 PROMISCUO. RAMA JUDICIAL\01-NOTIFICACION DEMANDA.exe"C:\Users\Admin\AppData\Local\Temp\NOTIFICACIONES DEMANDA JUDICIAL -JUZGADO 02 PROMISCUO. RAMA JUDICIAL\01-NOTIFICACION DEMANDA.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
780KB
MD53a2f76b6cbf47be02085406bfe6a54d4
SHA1964d9c6cb6e59d09671959c4005bfdecd3b12fe2
SHA25649750f2fcb600f6936d16ff7d974f8f92a438589cea1e310b86c34b01b585d9c
SHA512d83bf7de341087b78252da9a46d766836a4c9bf4aa1473c1af19fa50679815f66b8c67ec89600349a412365155b6a3056bacd4048fdf675e28592af36c82bdb5