Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 09:00
Static task
static1
Behavioral task
behavioral1
Sample
Confirmación de pago.gz
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Confirmación de pago.gz
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
sample.tar
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
sample.tar
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Confirmación de pago.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Confirmación de pago.exe
Resource
win10v2004-20240802-en
General
-
Target
sample.tar
-
Size
810.6MB
-
MD5
7fe98a6e5f0d17baeac7e42c3723d128
-
SHA1
27bb29e7b919df8f9f9e39a5048d262b7ea6c2c5
-
SHA256
3a1905a02d95a95fe9ffa32e967794f30cb67ffbf58f3157d2a900d0e939ec51
-
SHA512
957d6ce70f9a9167b38fa89fc73c004fd0a5b5475719338e071da5a74b2fa639a3c4ee006348b206747b96364952b987fbe2190fdf5911f2d5cbd03096a99320
-
SSDEEP
12288:Cti6NGb1oa6i42ez6fu1P+t8UTWibJEw5roaH6NqC:z1oY/21PITbOw5rZS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2736 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2736 AcroRd32.exe 2736 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2820 2672 cmd.exe 32 PID 2672 wrote to memory of 2820 2672 cmd.exe 32 PID 2672 wrote to memory of 2820 2672 cmd.exe 32 PID 2820 wrote to memory of 2540 2820 rundll32.exe 33 PID 2820 wrote to memory of 2540 2820 rundll32.exe 33 PID 2820 wrote to memory of 2540 2820 rundll32.exe 33 PID 2540 wrote to memory of 2736 2540 rundll32.exe 35 PID 2540 wrote to memory of 2736 2540 rundll32.exe 35 PID 2540 wrote to memory of 2736 2540 rundll32.exe 35 PID 2540 wrote to memory of 2736 2540 rundll32.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sample.tar1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sample.tar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sample.tar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sample.tar"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2736
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ee680e5816fe8fb0be764b4b199e458f
SHA1d4f1e9c64f5d8a58f1fee69cfaca5054f93a9fa2
SHA256fd44948d4590fe37447ddbbe8d59030c7853d131d3d98cb8ace807c642789c67
SHA5125fb1e1f98cf5e474cf95c539f5a19b4eb947f4ef42f0651c052805905455da2d1ce55f374ac431791e7d34d60df67cc9c6303393022c2848b232ef25e0be7dfc