Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 12:09
Behavioral task
behavioral1
Sample
Boleto.2a.via.arquivo.anexos.visualizar.exe
Resource
win7-20240903-en
General
-
Target
Boleto.2a.via.arquivo.anexos.visualizar.exe
-
Size
478KB
-
MD5
6981524ca41b3fdcdf2e17b1987e312b
-
SHA1
6687c094e37b7367b924f09ee7b0fb44a71f9c39
-
SHA256
830eda18b7bab059bb57b6d5f1ab225b0e19bc036501e26ba694062c0c903924
-
SHA512
2e226128a4ad6941e73898a8571ef4aeede7a19e5938e3726fe1e989933a5c4b6c423d71d3ae4c2801a90deb5ff4652f0a8563bb9bcc1ba1f7cda088185b829f
-
SSDEEP
6144:ZiLpzJlA3hTWyArrlMtSFXeww8Mlc02HLm+ZHBX0SZe2Tf/9VJUzVW4OX9WKKxK7:ZiLpjA3SaQeeZ6+Z+U/BNXnms
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Boleto.2a.via.arquivo.anexos.visualizar.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Boleto.2a.via.arquivo.anexos.visualizar.exe -
resource yara_rule behavioral1/memory/3012-0-0x0000000000400000-0x0000000000529000-memory.dmp upx behavioral1/memory/3012-28-0x0000000000400000-0x0000000000529000-memory.dmp upx behavioral1/memory/3012-45-0x0000000000400000-0x0000000000529000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boleto.2a.via.arquivo.anexos.visualizar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2564 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2564 AcroRd32.exe 2564 AcroRd32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2764 3012 Boleto.2a.via.arquivo.anexos.visualizar.exe 30 PID 3012 wrote to memory of 2764 3012 Boleto.2a.via.arquivo.anexos.visualizar.exe 30 PID 3012 wrote to memory of 2764 3012 Boleto.2a.via.arquivo.anexos.visualizar.exe 30 PID 3012 wrote to memory of 2764 3012 Boleto.2a.via.arquivo.anexos.visualizar.exe 30 PID 3012 wrote to memory of 2516 3012 Boleto.2a.via.arquivo.anexos.visualizar.exe 32 PID 3012 wrote to memory of 2516 3012 Boleto.2a.via.arquivo.anexos.visualizar.exe 32 PID 3012 wrote to memory of 2516 3012 Boleto.2a.via.arquivo.anexos.visualizar.exe 32 PID 3012 wrote to memory of 2516 3012 Boleto.2a.via.arquivo.anexos.visualizar.exe 32 PID 2516 wrote to memory of 2564 2516 CMD.exe 34 PID 2516 wrote to memory of 2564 2516 CMD.exe 34 PID 2516 wrote to memory of 2564 2516 CMD.exe 34 PID 2516 wrote to memory of 2564 2516 CMD.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Boleto.2a.via.arquivo.anexos.visualizar.exe"C:\Users\Admin\AppData\Local\Temp\Boleto.2a.via.arquivo.anexos.visualizar.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\CMD.exeCMD /C C:\Users\Admin\AppData\Local\Temp\BOLETO~1.bat2⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C Start BOLETO~1.PDF2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Boleto.2a.via.arquivo.anexos.visualizar.pdf"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252B
MD594b604c0e403a68d8be10cf2d11ae0fa
SHA18939ae010db8ff6d553bc33537fa7b7acaadf0f2
SHA256e72b59e3a947af9a6504ec8c45dfb1fe0e7478a13c968a74c8ed7a0c96b041a0
SHA51299e7c2195c78443ce3f1eff93cbe7b151f9eb8b0d4502141600f910ac1a0412fbfb257e938f72ba247d88c28e13daf508f64899c657f48354880195ff960c6be
-
Filesize
20B
MD5da3427767b8164b069b7f1cead5afd02
SHA17d9a577acfaa533a9c479f88d466929180576447
SHA256e53b93633158290fd3856558e94d8171c78dd285a7c039cfdc1a3285d634e75f
SHA512a6e4b092ecc0b682089b654066fbca30668c94fa9d54eea4e3c56477971d5cafbcb29462265a3064b7ef3d24d7d910c91bb8baf20af2d2a7acb4a2311a65b0f5