Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
¡Archivos͜͡Para・InstalaciónAutomática.rar
Resource
win7-20240708-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
¡Archivos͜͡Para・InstalaciónAutomática.rar
Resource
win10v2004-20240802-en
8 signatures
150 seconds
General
-
Target
¡Archivos͜͡Para・InstalaciónAutomática.rar
-
Size
117.5MB
-
MD5
fae994fe98c859c0d7d601fe618a0f79
-
SHA1
472ec168fd033894629c4f337ad85bd7e41fdd5b
-
SHA256
1e300e84ef23b5f51ff8ebebd9b742bae72d1d5a26d3687194dea26d489490a3
-
SHA512
575d2a150a3f47572dcb44e6aaab80707131ccc89faea318204257ca8bd25c445d79e25a3768f7adf69a958c29b707b04edd568996d1d663c450298955b74ab5
-
SSDEEP
3145728:utKUZiLps3qcLgpMU3LuzJxRJs9n5z+a9C+p1B:2KUq6lLgDLuxnc911B
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2744 2928 cmd.exe 31 PID 2928 wrote to memory of 2744 2928 cmd.exe 31 PID 2928 wrote to memory of 2744 2928 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\¡Archivos͜͡Para・InstalaciónAutomática.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\¡Archivos͜͡Para・InstalaciónAutomática.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2744
-