Analysis
-
max time kernel
620s -
max time network
835s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
YDRAY-DESCARGAR-NOTIFICACION-DE-SENTENCIA-JUDICIAL-AGRADECEMOS-CONFIRMAR-RECIBIDO-1.7z
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
YDRAY-DESCARGAR-NOTIFICACION-DE-SENTENCIA-JUDICIAL-AGRADECEMOS-CONFIRMAR-RECIBIDO-1.7z
Resource
win10v2004-20241007-en
General
-
Target
YDRAY-DESCARGAR-NOTIFICACION-DE-SENTENCIA-JUDICIAL-AGRADECEMOS-CONFIRMAR-RECIBIDO-1.7z
-
Size
1.0MB
-
MD5
4be392945a6b4b228f1889ac8bff5927
-
SHA1
2c9e287cb5619b9811b09b4830b327c48272b653
-
SHA256
421ff80415726f048213bed08a4d02f4c2f5a11af92893fc9ddc6b98e55db095
-
SHA512
031464c7548d9a7ee8a084cfe87871c250654e2b33921b5a03d84d3be279806167dc596d8410040655c2d1f542048eec38fab68847ce9dfbbf0573cec607330f
-
SSDEEP
24576:LbAtae9qGfn52ZCMXxxgH73/jIyBlKllmSZH8ymEEWrC:HIX99n5cCexxgbvjIyBgfm24EBm
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
15 15 15 15
120.duckdns.org:9003
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
0016 NotificacionElectronicaJudicial.exepid process 1888 0016 NotificacionElectronicaJudicial.exe -
Loads dropped DLL 2 IoCs
Processes:
0016 NotificacionElectronicaJudicial.execmd.exepid process 1888 0016 NotificacionElectronicaJudicial.exe 2476 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
0016 NotificacionElectronicaJudicial.execmd.exedescription pid process target process PID 1888 set thread context of 2476 1888 0016 NotificacionElectronicaJudicial.exe cmd.exe PID 2476 set thread context of 2136 2476 cmd.exe MSBuild.exe -
Drops file in Windows directory 2 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe chrome.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0016 NotificacionElectronicaJudicial.execmd.exeMSBuild.execmd.exetimeout.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0016 NotificacionElectronicaJudicial.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2692 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0400000000000000030000000100000002000000ffffffff chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = 00000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\SniffedFolderType = "Generic" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616257" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0 = 4c003100000000004a59094810204c6f63616c00380008000400efbe4a5925454a5909482a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\SniffedFolderType = "Generic" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0400000000000000030000000100000002000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\MRUListEx = 00000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\0\NodeSlot = "3" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\0\MRUListEx = ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
chrome.exe0016 NotificacionElectronicaJudicial.execmd.exepid process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 1888 0016 NotificacionElectronicaJudicial.exe 1888 0016 NotificacionElectronicaJudicial.exe 2476 cmd.exe 2476 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
7zFM.exechrome.exechrome.exepid process 2100 7zFM.exe 3056 chrome.exe 2160 chrome.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
0016 NotificacionElectronicaJudicial.execmd.exepid process 1888 0016 NotificacionElectronicaJudicial.exe 2476 cmd.exe 2476 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exechrome.exedescription pid process Token: SeRestorePrivilege 2100 7zFM.exe Token: 35 2100 7zFM.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
Processes:
7zFM.exechrome.exepid process 2100 7zFM.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2100 7zFM.exe 2100 7zFM.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exepid process 3056 chrome.exe 1556 chrome.exe 1556 chrome.exe 1556 chrome.exe 1556 chrome.exe 1556 chrome.exe 1556 chrome.exe 2860 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 1856 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2804 wrote to memory of 3008 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 3008 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 3008 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2972 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2748 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2748 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2748 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe PID 2804 wrote to memory of 2724 2804 chrome.exe chrome.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\YDRAY-DESCARGAR-NOTIFICACION-DE-SENTENCIA-JUDICIAL-AGRADECEMOS-CONFIRMAR-RECIBIDO-1.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2100
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef8379758,0x7fef8379768,0x7fef83797782⤵PID:3008
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:22⤵PID:2972
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:82⤵PID:2748
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:82⤵PID:2724
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2344 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:12⤵PID:3036
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2356 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:12⤵PID:2108
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1384 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:22⤵PID:1612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1284 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:12⤵PID:1680
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3424 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:82⤵PID:2280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:82⤵PID:1912
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2524
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f5a7688,0x13f5a7698,0x13f5a76a83⤵PID:796
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3456 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:82⤵PID:1004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4032 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:12⤵PID:1020
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2536 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:12⤵PID:1920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2336 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:12⤵PID:1912
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3976 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:12⤵PID:1664
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3676 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:12⤵PID:760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3840 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1972 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\YDRAY-DESCARGAR-NOTIFICACION-DE-SENTENCIA-JUDICIAL-AGRADECEMOS-CONFIRMAR-RECIBIDO-1.7z3⤵PID:2260
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1972 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3368 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:82⤵PID:2504
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3372 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:82⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3840 --field-trial-handle=1020,i,6769823350265370932,11954027051068007874,131072 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1856
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3064
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1880
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1a81⤵PID:1756
-
C:\Users\Admin\Desktop\New folder\DESCARGAR NOTIFICACIÃ’N DE SENTENCIA JUDICIAL AGRADECEMOS CONFIRMAR RECIBIDO 1\0016 NotificacionElectronicaJudicial.exe"C:\Users\Admin\Desktop\New folder\DESCARGAR NOTIFICACIÃ’N DE SENTENCIA JUDICIAL AGRADECEMOS CONFIRMAR RECIBIDO 1\0016 NotificacionElectronicaJudicial.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpED0.tmp.bat""4⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2692
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2060
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5701⤵PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9e5839ed26f0c202516bf6c52dfecd
SHA15b32721341527a6643a49e1c4657ba4ea0dd2f13
SHA256b0eb05a813cac69ea8c98ff0dd3c8fa73d08a27c8d81c1601b0624814e56fc32
SHA512cf810b05b8f4997e06e1f0306a9622b159f77a0277a4278c597ba3160446f8f58407e02a799593caae8a8f6376e36d8c510d794777f9b47085ca5384e74841a7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\336fcfd8-2a20-4594-b2e8-afb0bf75b2da.tmp
Filesize5KB
MD5a29fb1ce3b1a4948a6fb62801902d2c0
SHA198c0fabad55e40bea1b4dc92c5dac0c5ec8801c5
SHA2561e1d978c3ecca79926ecb0111529a97f265eeac7db25b1ffcaa3bf0f645352e6
SHA512f6aafe8529e6744372aa846c5607bd7504a3ff677719509d508e38526961f4c241cbf244770ee37b2503a64acb7536bb342c963a6d40651c987c81458823cd31
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\81f55bb6-f208-4d21-9de2-1e51e6218ad2.tmp
Filesize6KB
MD518265e3d63b4e5129b240986bfb49fc7
SHA1744316afed9c23c9f6bb049a39f9cff51a941b21
SHA256ae05a1f4529220ff39a8340223d653036afb801530584d424f495bed6ed92c03
SHA51239b36e1852b12f4f490fe6499733a56ecfc09a181d7b9fbeb2edae4e1abe1d853ae2866c0bad43087355a6d162ac6ca6ae0060aad3de367f2fef17e745b0eb4b
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
Filesize
1KB
MD5cc41b3088e2445de7cc16c06300769bf
SHA1cc5e5ebd3b7d317c81154bc3ce9e24f3a2dcf69d
SHA256dfed6c4ceae6d8e9b49e28b2628d4fe170736f6c0d8434ca02406ac5af00079b
SHA512d80213ed6faa8ab5b4b42fd3727f3fabe943eb846f48da4cca4c96a325da14e00c5295197cbbd54b0221c2affe3a4eac33d4c364e37e353bd0855db90af5d5f1
-
Filesize
1KB
MD5fc8c90c3d66a64f01bf13a11d2e65aae
SHA1b7217617afd6f82263b1a3f76bb74046251d328f
SHA256c6899ddfea0b5c3fbe4ca579a6daf9f61e3e7c82ac3050539481e277fd993845
SHA512b979ffcf33dd94f1cdfe4d8ae2792b7ba4fa44d28e4010dbb3ddfa734b61ed4f739fd9d991538fc321b7fb741fb7061e7a343d5ddfd64bd6f5f1e67781e1fb70
-
Filesize
744B
MD55f4993ee78ff966adfcc32bfec976bb6
SHA18d289e483ca3f00e5cfd004cedd6173df4ad004e
SHA256c29b3d2eec34f55a403fb16b7a4653fb7051e37224b7261870f0b50ba0a93aa0
SHA512c5c034c3b486f50391225599138886b340f1aafdb1d21848ac918e0a66b61d1648a3a1e8fc7d13c52aca0dada3633b2fcff70789b796fd92af48248fd21281dc
-
Filesize
864B
MD55b799cf9ecaa71ca17e7a3bb0d44f801
SHA1c97be4176ea22e7e656a733e6b1df440f95e7f7e
SHA256fdb15cad24a907f338cb14ecdd1034ec9ea28f19204e2592b4b978716cc89bf1
SHA512155cb5ad12e9657215d6cc4aefc1a313ffadfb7f4849aa0b3a3d7daec6d8b55c91963d9daded9717197b48739104aae5f6570b0703606abf917f2d5aa464b5ff
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
3KB
MD5942d97910aa4aeb5116a13773210a1f4
SHA182d77184638c62db44676407bf1c94f0a6450095
SHA25695b19cd14aaf3bb669847322637d0e2b0998f84b24e075ea95112ce942ea6bf0
SHA512e682a6e579f7ce395aba885efd36ab1e0534939e84a3a7eca9bd399380aa42c02a3a619829930ac5db234e1f0bdfa3d55108a0244b462ab064450a85dcd3b05b
-
Filesize
4KB
MD5591fc57a16938582e8faf03105b53a1e
SHA10ba5c5095a5c19fe34d910cf80db3b90359ff2cb
SHA256aa7defd3e30492c25482de9cfdfcd551ac0654ff8192363e04e1202f928ad640
SHA512ba1b3095c763b098afb591d0867a2754ff1c5c490bf66f9e67d76560b85ab608b187d5d349c98f32550bbae01fdaf061e1dcd99ee63b3ec30965b1be7e941a91
-
Filesize
4KB
MD536a22cad773b6d4adab15cda85b51bf6
SHA1b70ef58fe776dcf2e27ed8f3d7611b603a34d019
SHA256c22987ef036de0968e01202f3b01f556a3c6d5cb067e63e6cfe5c8b94708dbed
SHA5126c85adeb199b9793ceb428e5eaffe164c5bc5e9e6e61f24600ad80b3f124aec6a0b072ea12030b6183406824c085538b1e63c4e3f06c8387df4c8086d2c4093c
-
Filesize
4KB
MD563443961c947a5b9a16756e89fff24ba
SHA19bbceac0415327371cd260745192e17d3b16ded6
SHA25652f7b155f30c597420e0205460de3e4718f67af45413c926d76cebf7a176886a
SHA512ef0e59384189d84dee1dbf60a35c5c2cc772101ebd0db1b699d4239bd62bb8e63dd1494bfd37de8374cf6ddfef00bd68cd285bbb9f0f158b621e8111ee7db4a6
-
Filesize
4KB
MD5e7cb1217527265b6648a1ea2d517eca2
SHA111b734422cf4a44f1d4fb9b222e3ff588e2a57e0
SHA2562253f58dfca4d3536febf6804013aacbaf1f17b2a168306922909e8cd28beece
SHA5124d71540a9008bc4059b19b8fb02f432753ae2a61685965424a96c604d3527ed213a475071492bcdf9e180445de267fd410efa473e90d8422dcd0042f991123a7
-
Filesize
689B
MD50cfcc013cfc91bb2339ec59ea5c6b336
SHA1224dac715f8c775b75bb830329961ceb9d15c9aa
SHA2561408dc43a5b23808ee2de44e56ca94af17a0617b85b6b6b60488d98aa33924ee
SHA5121c92b65dce30ac7000e727cf2d07bdbdac443bd301d11d4320638f0fc18a45119b9cb3d0650d0f21d3e07b728d2b9ef2d4dcc94a8defc240bab1784159a51ae5
-
Filesize
363B
MD5e4f85610e2a2f5e0683ce31e5016058c
SHA1d49a725d9f604c33c240f18e385dcb0bbe7788e6
SHA256a29a08cd53b83aa3fbb98c12e2f08a51a19f5df8ff7a8da079dac236e544df0b
SHA512018c1a43ab2f58f2cf38deb5e3efc199898508e5e472e7e39e97fd6bc6c96ace1336be39881ee2bca2dee39ea288ea2500ea2e18fdd904f55f5290fbddc37da5
-
Filesize
4KB
MD510397bcdcb4d8bec945bb1e20380441e
SHA121a4c8a4ab4e2f8cd6518d4791ecbea35f631d5b
SHA25627ebd50fd8706b5f414c6e21c9231ffeeb4119efef75a4afa32402a0a5a132ca
SHA51261b8de6328d6d3b2b0669009980423ebadafdb4ff66d532c3fa3d205e2b9b76bf3ddb1b72c5a75cc9624ad024233f0c6eca2eae3fa98663483f864520466bbc7
-
Filesize
5KB
MD5a377ba70fad63e0315aebcfd1a6c20c4
SHA19b4654da6323bc13b7e25d2856c1b1ae49e1b1ff
SHA25614db498753db9b051bcc41ea387e0f4b929175432498d25d7cfb97a303202c95
SHA512ae8140a5ee2c5e585e25132671df2897cb7ab236a623b84b46a107e807371149bf6115c0a6396b0059cb85572bec9a850ba4c4a230f558ace489b03da03529e2
-
Filesize
5KB
MD5165155228c4f95f183f4ecead53decb5
SHA17260c59da78c378676a8b5ed44bdeb3198ec2fb0
SHA25639c2e250be7471c3daa6a21e2e8bb09a35f04fdcad00fdba176a33229074c110
SHA51208b60325c367119e5f11c5645be9cf85dcb48dab43ece4288585f6042abdadfb763456d7e0a3ae0f6202b2161fefec92cbe60985538bf22e40a70e2a24b39658
-
Filesize
6KB
MD57091e2aa4a987d8e3dcae6c71615de1b
SHA1ea72e476ffe2a4ceae77ecc2552929f696695643
SHA2563e25e4bd3e3e02a12e3dc686105bd89029757f5c6996f80cd224c70498d54563
SHA512a4b4758a8c20922320d01624aa848ec353e66105ad4119679f8ba694f8f47806ede672adabcd9c23f413156e95ecb69ea5bc3165044d83fbd7890892f24006e0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT~RFf78784b.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
350KB
MD5e7af0212f18919d9003e7a92fb1e9047
SHA19510547fed80aefad68532fc3e64c6937fd340d4
SHA256f90932753706e8a7d2f8b49247615eeae3b177aacfe38b07ffb2b30bddbe2ec9
SHA5125fad1540a9b7de159c4b2e335f6279b967378d3a692770d7573cfacaef473ec4ad0a52ff12dbc8cdfd8d0bf851788a482cebbbdfae1815a678ff7a5ec6b8130a
-
Filesize
296KB
MD5d968a4ed866d07b0665fd7717293f65e
SHA13f56da6a1450c4d19edc9937c0eb51b3538fc7d2
SHA25615f7bc655784a32edf11801fd6cc8c54b193e4225da83a6121ed8d49303aafbd
SHA51232d6ddecb9a68b62332c7088a0cafbe45706d593b41c214f297b8c3059870d7b838999921616022b7af7fcb40d1b77a0408252f714e666bdd9a0ad406421b7ea
-
Filesize
777KB
MD5a57b5571bc21dd79ae62035966e762ca
SHA197f7f85e3c49a49967e27bf10aad79d19999e1ce
SHA2560a8b2d1d13afa63d0cbe00ebf9b331fa02cb4565e812808887b29e4e8fcb070a
SHA512fa9fc4ec033a50d4f2f625c75120f1eb1f0f62e401ea9ea28d03e858541e37869e847ea2502345e66844f76cb5587679c6943dd10fec81a73a83a55973d01b33
-
Filesize
2.3MB
MD5c3e5206ba0d4f17376458a4196f76789
SHA183657c955f7f15d1441c0bfb0eba96ded48d03d3
SHA25625bcede01c28881a5f15acbea1d6d88b42a7e54500f149ae7e0a3fa400b0abf9
SHA512880fda58ed82ef04c9db69c589dbec548e1eb92221518fe3235053355a142f63f5d79c35256c88c6e33fbaad6085e682ae7552686130f10e05465b046ca8cabc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
170B
MD5883b8c546584be0ee7a8ac928473ba7b
SHA1ac31306eae541ee0a8f1b556208ab72d65e32e06
SHA256d53b139124a8b96c371782415b4b24ac25b4b39513107cf7a6552b08a9f3c2eb
SHA512198dbedef556bdfbe75eda82470b40098e17be6772291f130e0d9fff945fd87e464302324137fccc33cf4832b9bf883615d0e4246799a6998dddde965d64983a
-
C:\Users\Admin\Desktop\New folder\DESCARGAR NOTIFICACIÃ’N DE SENTENCIA JUDICIAL AGRADECEMOS CONFIRMAR RECIBIDO 1\0016 NotificacionElectronicaJudicial.exe
Filesize141KB
MD5704925ecfdb24ef81190b82de0e5453c
SHA11128b3063180419893615ca73ad4f9dd51ebeac6
SHA2568cc871ee8760a4658189528b4a5d8afe9824f6a13faaf1fe7eb56f2a3ad2d04e
SHA512ca187015812ddfcaa6515f3a5b780183b4a772801aa14b3f785d6dee9b9aa7db6402a7b346623fd24cf4a28f9856683022b10c3d812f8f2888e25bb218cbf216
-
C:\Users\Admin\Desktop\New folder\DESCARGAR NOTIFICACIÃ’N DE SENTENCIA JUDICIAL AGRADECEMOS CONFIRMAR RECIBIDO 1\UXCore.dll
Filesize811KB
MD53c51d0ce6fa1a2e2cbe5d8510211b8e0
SHA15d025aca30cd7d6ecd0afc8b4ee719649219087c
SHA256ee13b2c13ded5ceabaf06030147917e748415e23d01904e6c63503817762d436
SHA51233e74cf8d08fa11ce791f3b92cd9d0c130cce717952618c724a30a63189529ed894dfb396425c0911994ef8e519844e39316485707503ffc3e4d34390fc48266
-
C:\Users\Admin\Desktop\New folder\DESCARGAR NOTIFICACIÃ’N DE SENTENCIA JUDICIAL AGRADECEMOS CONFIRMAR RECIBIDO 1\hja
Filesize535KB
MD50ade8b3043cff248e603aebaec3fbd2f
SHA12ce1fc0b7161d32e7c4fdc91188b5c86a6736e8f
SHA25600cdf1d8f6d524b13be129514ed38724861e1415aadf15d029f053fda5007862
SHA51261f69136c94319ea7d1a57ff7b5a55cd9fe64109743deb4dac5695a71f4ac222782df0e087f5b532f85befeb933d0da9252e50a89d4bd8fb16f57aa2e9b24a28
-
C:\Users\Admin\Desktop\New folder\DESCARGAR NOTIFICACIÃ’N DE SENTENCIA JUDICIAL AGRADECEMOS CONFIRMAR RECIBIDO 1\moroftq
Filesize44KB
MD5a24d47582ad850a1364cacef04c030a5
SHA1797890aa2f2d90fe8d3f44b3b61e34e50bc766f5
SHA25664945e3f7dd57695fcfb19d38ee37410634381bf36df21ca6275f01cf72e62de
SHA51262ca8c52ff76159d7616e5d6cc033783dfb6b86797ccf302e879a3104e03dbea93de01b9c72642d98c2ffdd7f3bd44d9ff79a5c283658edfe97a2fc83cfb4cf2
-
C:\Users\Admin\Desktop\New folder\DESCARGAR NOTIFICACIÃ’N DE SENTENCIA JUDICIAL AGRADECEMOS CONFIRMAR RECIBIDO 1\msvcr80.dll
Filesize612KB
MD543143abb001d4211fab627c136124a44
SHA1edb99760ae04bfe68aaacf34eb0287a3c10ec885
SHA256cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03
SHA512ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e