Overview
overview
10Static
static
1Notificaci...l .exe
windows7-x64
10Notificaci...l .exe
windows10-2004-x64
10Notificaci...c_.dll
windows7-x64
3Notificaci...c_.dll
windows10-2004-x64
3Notificaci...m_.dll
windows7-x64
3Notificaci...m_.dll
windows10-2004-x64
3Notificaci...t_.dll
windows7-x64
3Notificaci...t_.dll
windows10-2004-x64
3Notificaci...20.dll
windows7-x64
3Notificaci...20.dll
windows10-2004-x64
3Notificaci...20.dll
windows7-x64
3Notificaci...20.dll
windows10-2004-x64
3Analysis
-
max time kernel
44s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
Notificacion Demanda Laboral 698787/01Demanda laboral .exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Notificacion Demanda Laboral 698787/01Demanda laboral .exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Notificacion Demanda Laboral 698787/madbasic_.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Notificacion Demanda Laboral 698787/madbasic_.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Notificacion Demanda Laboral 698787/maddisAsm_.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Notificacion Demanda Laboral 698787/maddisAsm_.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Notificacion Demanda Laboral 698787/madexcept_.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Notificacion Demanda Laboral 698787/madexcept_.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Notificacion Demanda Laboral 698787/rtl120.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Notificacion Demanda Laboral 698787/rtl120.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Notificacion Demanda Laboral 698787/vcl120.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Notificacion Demanda Laboral 698787/vcl120.dll
Resource
win10v2004-20241007-en
General
-
Target
Notificacion Demanda Laboral 698787/01Demanda laboral .exe
-
Size
163KB
-
MD5
0588ce0c39da3283e779c1d5b21d283b
-
SHA1
1f264a47972d63db2cde18dc8311bc46551380eb
-
SHA256
d5a6714ab95caa92ef1a712465a44c1827122b971bdb28ffa33221e07651d6f7
-
SHA512
a5f97ac156d081cb4d9b3f32948eea387725c88af0f19e8bc8db2058a19e211648b7fd86708ff5e1db8f7b57ca3ab8edeba771c9d684c53bcb228ca71adab02a
-
SSDEEP
3072:yK2FRsfrS8Ywp3GKJ7hDD/vRvDTX8QlevsqYau7j7/EecxurY:x1TSG/XT5Fau7pXk
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
WARrose
proxa.kozow.com:7373
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
01Demanda laboral .execmd.exedescription pid process target process PID 3408 set thread context of 212 3408 01Demanda laboral .exe cmd.exe PID 212 set thread context of 2588 212 cmd.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
01Demanda laboral .execmd.exeMSBuild.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01Demanda laboral .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1572 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
01Demanda laboral .execmd.exeMSBuild.exepid process 3408 01Demanda laboral .exe 3408 01Demanda laboral .exe 212 cmd.exe 212 cmd.exe 2588 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
01Demanda laboral .execmd.exepid process 3408 01Demanda laboral .exe 212 cmd.exe 212 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 2588 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 2588 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
01Demanda laboral .execmd.exedescription pid process target process PID 3408 wrote to memory of 212 3408 01Demanda laboral .exe cmd.exe PID 3408 wrote to memory of 212 3408 01Demanda laboral .exe cmd.exe PID 3408 wrote to memory of 212 3408 01Demanda laboral .exe cmd.exe PID 3408 wrote to memory of 212 3408 01Demanda laboral .exe cmd.exe PID 212 wrote to memory of 2588 212 cmd.exe MSBuild.exe PID 212 wrote to memory of 2588 212 cmd.exe MSBuild.exe PID 212 wrote to memory of 2588 212 cmd.exe MSBuild.exe PID 212 wrote to memory of 2588 212 cmd.exe MSBuild.exe PID 212 wrote to memory of 2588 212 cmd.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Notificacion Demanda Laboral 698787\01Demanda laboral .exe"C:\Users\Admin\AppData\Local\Temp\Notificacion Demanda Laboral 698787\01Demanda laboral .exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp94D8.tmp.bat""4⤵PID:2776
-
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
780KB
MD5849c00e9ac6fbe622614cfa9fb2c3c89
SHA14332c208529019589af2595e649b98bf147e94fd
SHA256fa9f852bcdec8fe5b6c9a833c6da113bbb162db85ca39a36758f690982cf3480
SHA51245c0e3d1f580783d7882bbe30aa35b9a969f8348c9113c785bea34fc0e3df3c618878ab4b9617418e49dbeb560f70039fd07201623bf350ab641a3981d300f1e
-
Filesize
171B
MD5db8beac6c396aff8a873860a332e722a
SHA1efa08e139a9d55b8d6e374e53d8000726700e6cc
SHA256ed34a3a7e636193a8514b12972f53a2f3a0cce2bd3752273559b1f786561c597
SHA512cf68db2c6b5d49b8ab024b823101a181c36572629ab6c5d563588dfca2259e42ee499931c4f2e669284b6bdc54eb4a29d76bb98c982000d4a169bb6f2209ddd8