Analysis

  • max time kernel
    180s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2024, 20:46

General

  • Target

    INFORME COMERCIAL DE TRANSACCIÓN 18 DE OCTUBRE/OFICIO COMERCIAL DE TRANSACCIÓN 18 DE OCTUBRE.exe

  • Size

    695KB

  • MD5

    f621bcc81502beb71cfc6cb277f541d7

  • SHA1

    899d5a8bde60177a5ead87c999f79ee1076592e3

  • SHA256

    1ee61e9cb3034a6229ff3975ae8c871047afcc0e9e4b21f19a9198e463ae62c2

  • SHA512

    84514718bfc367c1a23c7dcafae2df45055d0f3001340740f1415cd6911f71d3b7a064d853c38d50e3ca774bc3221a72960f878922d2d7477eb7cfac1de5191d

  • SSDEEP

    12288:rZeZi1X5Ni3O32PaxC119ebmiOZgIu0dFnbA:88i+3LK3eIu0dFnbA

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\INFORME COMERCIAL DE TRANSACCIÓN 18 DE OCTUBRE\OFICIO COMERCIAL DE TRANSACCIÓN 18 DE OCTUBRE.exe
        "C:\Users\Admin\AppData\Local\Temp\INFORME COMERCIAL DE TRANSACCIÓN 18 DE OCTUBRE\OFICIO COMERCIAL DE TRANSACCIÓN 18 DE OCTUBRE.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4984
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1360

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\asfddfsdfd\logs.dat

      Filesize

      184B

      MD5

      185b9086a1cf81bce1a7a22af48f25db

      SHA1

      a828b112010d53cd73f0e562eb8ba316902e90ff

      SHA256

      6af19765c9538cdb47cd8354e37ec09c3abc37ad1283dac6482bbde30f3b988a

      SHA512

      58256bdd7946e4acda3c35f21160e1504312c3645049bdb8bc82864b5fa011e8e8f699183ff80e85a1bb86911962a85cc3415e0fd0027b200cd734f54b9c1ecb

    • memory/4984-0-0x000000007466E000-0x000000007466F000-memory.dmp

      Filesize

      4KB

    • memory/4984-1-0x00000000006C0000-0x000000000076E000-memory.dmp

      Filesize

      696KB

    • memory/4984-2-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4984-3-0x0000000006380000-0x00000000064A4000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-4-0x0000000006A50000-0x0000000006FF4000-memory.dmp

      Filesize

      5.6MB

    • memory/4984-5-0x0000000006560000-0x00000000065F2000-memory.dmp

      Filesize

      584KB

    • memory/4984-9-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-15-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-37-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-45-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-69-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-67-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-65-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-63-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-61-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-59-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-57-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-55-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-53-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-51-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-49-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-47-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-43-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-41-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-39-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-33-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-31-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-35-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-29-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-25-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-23-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-21-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-19-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-17-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-13-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-12-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-7-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-27-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-6-0x0000000006380000-0x000000000649F000-memory.dmp

      Filesize

      1.1MB

    • memory/4984-1081-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4984-1080-0x000000007466E000-0x000000007466F000-memory.dmp

      Filesize

      4KB

    • memory/4984-1082-0x00000000068D0000-0x0000000006968000-memory.dmp

      Filesize

      608KB

    • memory/4984-1083-0x0000000006700000-0x000000000674C000-memory.dmp

      Filesize

      304KB

    • memory/4984-1084-0x0000000006860000-0x00000000068B4000-memory.dmp

      Filesize

      336KB

    • memory/4984-1088-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4984-1090-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4984-1091-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4984-1092-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4984-1106-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB