Overview
overview
10Static
static
3DEMANDA JU...al.exe
windows7-x64
10DEMANDA JU...al.exe
windows10-2004-x64
10DEMANDA JU...RT.dll
windows7-x64
1DEMANDA JU...RT.dll
windows10-2004-x64
1DEMANDA JU...00.dll
windows7-x64
1DEMANDA JU...00.dll
windows10-2004-x64
1DEMANDA JU...00.dll
windows7-x64
1DEMANDA JU...00.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
DEMANDA JUDICIAL ESPECIAL 13252548/01Aviso juridico especial.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DEMANDA JUDICIAL ESPECIAL 13252548/01Aviso juridico especial.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DEMANDA JUDICIAL ESPECIAL 13252548/VBoxRT.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
DEMANDA JUDICIAL ESPECIAL 13252548/VBoxRT.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
DEMANDA JUDICIAL ESPECIAL 13252548/msvcp100.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
DEMANDA JUDICIAL ESPECIAL 13252548/msvcp100.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
DEMANDA JUDICIAL ESPECIAL 13252548/msvcr100.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
DEMANDA JUDICIAL ESPECIAL 13252548/msvcr100.dll
Resource
win10v2004-20241007-en
General
-
Target
DEMANDA JUDICIAL ESPECIAL 13252548/01Aviso juridico especial.exe
-
Size
58KB
-
MD5
d31086fca1a6d45927d90963ffd1989b
-
SHA1
bce4e7984ca862c678ee9395e94c10d60a868aa1
-
SHA256
ead20929594f6bfb4004c08c45c5567131d88abde650a2d2a87fbd3d441ddb98
-
SHA512
00c4866cec9717ed0d470e9dcd257c92132c5707c3fb04c49788f7b59b5723c9ae212982cbdda70be56310ffb1cf40b10f84181b91eb213d0a8a7f3c6ddf6133
-
SSDEEP
1536:k0d0prGh3Sh+apyRv3ERiPkYOSREd7AyF:k3Ga+HsDYOSR0L
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
POWERMONEY
powermaster1.kozow.com:6161
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
01Aviso juridico especial.execmd.exedescription pid process target process PID 1376 set thread context of 3696 1376 01Aviso juridico especial.exe cmd.exe PID 3696 set thread context of 1720 3696 cmd.exe MSBuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\superUpdate_alpha.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MSBuild.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
01Aviso juridico especial.execmd.exeMSBuild.exepid process 1376 01Aviso juridico especial.exe 1376 01Aviso juridico especial.exe 3696 cmd.exe 3696 cmd.exe 1720 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
01Aviso juridico especial.execmd.exepid process 1376 01Aviso juridico especial.exe 3696 cmd.exe 3696 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 1720 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 1720 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
01Aviso juridico especial.execmd.exedescription pid process target process PID 1376 wrote to memory of 3696 1376 01Aviso juridico especial.exe cmd.exe PID 1376 wrote to memory of 3696 1376 01Aviso juridico especial.exe cmd.exe PID 1376 wrote to memory of 3696 1376 01Aviso juridico especial.exe cmd.exe PID 1376 wrote to memory of 3696 1376 01Aviso juridico especial.exe cmd.exe PID 3696 wrote to memory of 1720 3696 cmd.exe MSBuild.exe PID 3696 wrote to memory of 1720 3696 cmd.exe MSBuild.exe PID 3696 wrote to memory of 1720 3696 cmd.exe MSBuild.exe PID 3696 wrote to memory of 1720 3696 cmd.exe MSBuild.exe PID 3696 wrote to memory of 1720 3696 cmd.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DEMANDA JUDICIAL ESPECIAL 13252548\01Aviso juridico especial.exe"C:\Users\Admin\AppData\Local\Temp\DEMANDA JUDICIAL ESPECIAL 13252548\01Aviso juridico especial.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
780KB
MD577fc9b6b80816e0d759006d96839115b
SHA1717304a2bd8c4a349b3874ea8d76e7b79f4d2cdf
SHA256584d4c2c5659830534c9d6205f542092c9f15a1a45522b602b25d00ea51ddc5a
SHA51229661ad5f3240bfed0b126b209bcc5a60968b678668e62a2ed412688b3c83ddfac855d83259ab17cd540cd997083a59935d47ad06737f00cf39c17010519396d