Static task
static1
Behavioral task
behavioral1
Sample
Notifica Demanda Ref. 25421208-2024 Admite Juzgado Civil.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Notifica Demanda Ref. 25421208-2024 Admite Juzgado Civil.exe
Resource
win10v2004-20241007-en
General
-
Target
Notifica Demanda Ref. 25421208-2024 Admite Juzgado Civil.exe
-
Size
2.0MB
-
MD5
3d688bdc32ca1df6570115284247a661
-
SHA1
9e65416d36b4c54f28be49b9b88846a426111aa0
-
SHA256
6804e81b25e4ce4a13a794265d81f17e975119f0298f8bc1bab6e32ef68e96ed
-
SHA512
3b41c9fe21a3973198fe2d4f58f153f2113da861892557b5cdaf7ead410cf48702946422873a90260ac9f6ab3bd17e5d9d9b3329c7fd0a0bc026d3c181f9cc91
-
SSDEEP
49152:2S2EcnQUXj6SELV6HKcnkkdK9lQJhXfpCMmydLw9d5Oeqlt/IdMWRtpiFTm02t2m:oXV5gdswN/CjKb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Notifica Demanda Ref. 25421208-2024 Admite Juzgado Civil.exe
Files
-
Notifica Demanda Ref. 25421208-2024 Admite Juzgado Civil.exe.exe windows:4 windows x86 arch:x86
a7d3b38a275dc1689652e4de7483c8d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadCodePtr
SetUnhandledExceptionFilter
GetDriveTypeA
GetCPInfo
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
LoadLibraryA
RaiseException
CompareStringA
VirtualAlloc
VirtualFree
HeapCreate
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCommandLineA
GetCommandLineW
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
GetSystemTime
RtlUnwind
GetSystemTimeAsFileTime
SetCurrentDirectoryW
GetCurrentDirectoryW
SetEnvironmentVariableW
HeapFree
HeapAlloc
HeapReAlloc
GetVersion
GetStartupInfoW
GetModuleHandleA
SetEndOfFile
GetACP
GetOEMCP
SetEnvironmentVariableA
GetTempFileNameW
SetVolumeLabelW
HeapDestroy
CreateMutexW
GetTickCount
GetProfileStringW
GetLocaleInfoW
GetNumberFormatW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetFullPathNameW
GetDiskFreeSpaceW
SystemTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetUserDefaultLangID
GetSystemDirectoryW
TerminateProcess
GetTimeFormatW
GetDateFormatW
GetUserDefaultLCID
EnumDateFormatsW
EnumTimeFormatsW
GetShortPathNameW
GetPrivateProfileStringW
GetLocalTime
GetFileSize
SetFilePointer
WaitForMultipleObjects
PeekNamedPipe
ReadFile
CreateProcessW
SetEvent
WaitForSingleObject
TerminateThread
CreatePipe
DuplicateHandle
CreateEventW
GetLastError
GetCurrentProcessId
MulDiv
SizeofResource
GetTimeZoneInformation
lstrcpynA
GetLogicalDrives
InitializeCriticalSection
DeleteCriticalSection
GlobalHandle
FreeResource
Sleep
CreateThread
ExitProcess
SetLastError
CompareStringW
lstrcpyW
FindResourceW
LoadResource
LockResource
GetCurrentProcess
FlushInstructionCache
GetLogicalDriveStringsW
GetDriveTypeW
GetFileAttributesW
lstrcatW
lstrcmpiW
lstrcmpW
FindFirstFileW
FindNextFileW
FindClose
CopyFileW
CreateDirectoryW
WideCharToMultiByte
GetModuleFileNameW
CreateFileW
WriteFile
CloseHandle
RemoveDirectoryW
SetFileAttributesW
DeleteFileW
GetTempPathW
FreeLibrary
GetVersionExW
MultiByteToWideChar
OutputDebugStringW
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
GetWindowsDirectoryW
GetProcAddress
lstrlenA
GetModuleHandleW
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
lstrcpynW
lstrlenW
LoadLibraryW
InterlockedExchange
user32
GetScrollPos
MoveWindow
SetScrollInfo
IsRectEmpty
SetScrollPos
DrawIconEx
GetMenuDefaultItem
GetSystemMenu
DrawFrameControl
CallNextHookEx
GetSysColorBrush
ModifyMenuW
WindowFromPoint
IsMenu
TrackPopupMenuEx
PeekMessageW
GetWindowThreadProcessId
SetMenuItemInfoW
SetWindowsHookExW
UnhookWindowsHookEx
MessageBeep
InsertMenuW
CheckMenuItem
EnableMenuItem
GetWindowDC
TranslateAcceleratorW
SetWindowLongW
SendMessageW
CallWindowProcW
GetWindowLongW
wsprintfW
SetWindowTextW
SetTimer
ShowWindow
GetDlgItem
SetWindowPos
MapWindowPoints
IsDialogMessageW
LoadBitmapW
GetIconInfo
SetRect
DrawEdge
SendMessageA
TrackMouseEvent
GetMessagePos
CreatePopupMenu
TrackPopupMenu
IntersectRect
CreateDialogParamW
FrameRect
InflateRect
PostMessageW
CopyRect
IsWindowVisible
SetClassLongW
GetKeyState
ClientToScreen
AppendMenuW
LoadStringA
RemoveMenu
DrawMenuBar
GetMenuStringW
DefFrameProcW
TranslateMDISysAccel
SetForegroundWindow
SetMenu
LoadAcceleratorsW
BringWindowToTop
DeleteMenu
LoadIconW
DefMDIChildProcW
GetClassLongW
IsDlgButtonChecked
CheckDlgButton
CreateDialogIndirectParamW
GetWindowPlacement
mouse_event
MenuItemFromPoint
SetWindowPlacement
GetClientRect
SetMenuDefaultItem
GetWindowRect
GetWindow
GetParent
LoadImageW
GetSystemMetrics
GetFocus
FindWindowExW
RegisterClipboardFormatW
KillTimer
PostQuitMessage
EndDialog
GetAsyncKeyState
EnumChildWindows
MessageBoxW
CharNextW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
LoadStringW
SetRectEmpty
DefWindowProcW
TranslateMessage
DispatchMessageW
GetScrollInfo
DrawIcon
RegisterClassW
ScrollWindowEx
IsZoomed
SendMessageTimeoutW
GetMessageW
SetParent
InvalidateRgn
CreateAcceleratorTableW
GetDesktopWindow
RedrawWindow
IsChild
RegisterWindowMessageW
GetClassInfoExW
LoadCursorW
RegisterClassExW
DialogBoxIndirectParamW
IsWindowEnabled
GetSysColor
DrawFocusRect
FillRect
DrawTextW
GetClassNameW
CreateCursor
GetWindowTextLengthW
OffsetRect
LoadMenuW
DestroyMenu
ShowCaret
RemovePropW
EnableWindow
ScreenToClient
SetDlgItemTextW
GetWindowTextW
GetDlgCtrlID
DialogBoxParamW
GetActiveWindow
CharLowerW
ReleaseDC
GetDC
GetMenuItemInfoW
GetMenuItemCount
GetSubMenu
CreateWindowExW
DestroyCursor
GetCursorPos
ReleaseCapture
GetCapture
SetCapture
SetFocus
UpdateWindow
SetCursor
PtInRect
InvalidateRect
BeginPaint
DestroyWindow
IsWindow
EndPaint
CharUpperW
EnumWindows
SystemParametersInfoW
gdi32
CreateEnhMetaFileW
Rectangle
SetPixelV
GetBkColor
DPtoLP
LPtoDP
GetBitmapDimensionEx
GetEnhMetaFileHeader
SetViewportExtEx
SetWindowExtEx
SetMapMode
GetViewportExtEx
GetWindowExtEx
CloseEnhMetaFile
SelectClipRgn
DeleteEnhMetaFile
EndDoc
AbortDoc
EndPage
StartPage
ResetDCW
StartDocW
SetStretchBltMode
StretchBlt
GetCurrentObject
GetPixel
SetDIBitsToDevice
SetPixel
CreateDCW
SetViewportOrgEx
GetViewportOrgEx
SetBrushOrgEx
CreateBitmap
CreatePatternBrush
PatBlt
GetDIBits
GetTextExtentPoint32W
GetClipBox
SaveDC
ExtTextOutW
RestoreDC
CreatePen
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
OffsetWindowOrgEx
SetWindowOrgEx
GetDeviceCaps
CreateCompatibleBitmap
BitBlt
DeleteDC
CreateFontIndirectW
DeleteObject
GetObjectW
CreateDIBSection
CreateCompatibleDC
SelectObject
GetStockObject
SetBkColor
SetTextColor
OffsetViewportOrgEx
SetBkMode
CreateSolidBrush
winspool.drv
GetPrinterW
OpenPrinterW
ClosePrinter
comdlg32
GetOpenFileNameW
PageSetupDlgW
PrintDlgW
GetSaveFileNameW
advapi32
RegCloseKey
RegDeleteKeyW
RegOpenKeyExW
GetUserNameW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegQueryValueExW
RegOpenKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CryptCreateHash
CryptAcquireContextW
CryptDestroyHash
CryptReleaseContext
CryptHashData
CryptGetHashParam
GetTokenInformation
RegEnumKeyExW
shell32
ord21
SHBrowseForFolderW
ord88
ExtractIconExW
SHGetSettings
ord25
DragQueryFileW
ord17
ord16
SHGetFileInfoW
SHFileOperationW
DragAcceptFiles
ord155
ord18
SHGetDesktopFolder
ord4
ord2
SHGetSpecialFolderPathW
ShellExecuteExW
SHGetPathFromIDListW
ShellExecuteW
SHGetMalloc
SHGetSpecialFolderLocation
ord190
ole32
RegisterDragDrop
OleLockRunning
CoTaskMemAlloc
StringFromCLSID
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoTaskMemFree
ReleaseStgMedium
CoCreateInstance
CoInitialize
CoUninitialize
OleSetClipboard
RevokeDragDrop
CoSetProxyBlanket
oleaut32
VariantTimeToSystemTime
VariantChangeType
OleCreatePictureIndirect
DispCallFunc
SafeArrayDestroy
VariantInit
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
OleCreateFontIndirect
LoadRegTypeLi
SysStringLen
SysAllocString
VariantClear
SysAllocStringLen
SysFreeString
comctl32
ImageList_LoadImageW
_TrackMouseEvent
ImageList_ReplaceIcon
ImageList_Create
ImageList_GetIconSize
ImageList_SetBkColor
InitCommonControlsEx
ImageList_DrawEx
ImageList_GetIcon
ImageList_GetImageCount
ImageList_Destroy
ImageList_Draw
ImageList_AddMasked
ImageList_GetImageInfo
CreateStatusWindowW
msimg32
AlphaBlend
gdiplus
GdipSetImageAttributesGamma
GdipCreateBitmapFromHBITMAP
GdipCloneBrush
GdipCreateFromHDC
GdipSetSmoothingMode
GdipSetInterpolationMode
GdipCreateSolidFill
GdipDeleteBrush
GdipDrawImageRectI
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipSetImageAttributesColorMatrix
GdipDrawImageRectRectI
GdipDisposeImageAttributes
GdipDeleteGraphics
GdipDisposeImage
GdipFree
GdipCloneImage
GdipAlloc
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipCreateHICONFromBitmap
GdipFillPath
GdipCreatePath
GdipAddPathLineI
GdipAddPathArcI
GdipClosePathFigure
GdipDeletePath
GdiplusStartup
GdipSetCompositingQuality
GdipCreateImageAttributes
winmm
timeGetTime
shlwapi
StrCpyW
Sections
.text Size: 840KB - Virtual size: 838KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ