Analysis
-
max time kernel
77s -
max time network
295s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
clZM1_NOTIFICACION DEMANDA LABORAL_clZM1.svg
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
clZM1_NOTIFICACION DEMANDA LABORAL_clZM1.svg
Resource
win10v2004-20241007-en
General
-
Target
clZM1_NOTIFICACION DEMANDA LABORAL_clZM1.svg
-
Size
591KB
-
MD5
4a59432743a0b4b5d7e6a050a9e76ff4
-
SHA1
0ea8706c297d98a9e883c7c798238267b67b82f9
-
SHA256
928a12593295616bcc43ef7829d9d76a00d62e9381829b92e88b92e0bccd1083
-
SHA512
897611fd251bfc6a60683f93f44642076f9e5e492d043d88777c03fd4017363a8b61208cde36adc97997feba52195b1bfc69e5d0374dbbd8b52363dd45de0fc7
-
SSDEEP
6144:KLsuC+g8t5g0YBnsUdU1E6Rn4lDM/PMhapBLGvjn8iPr1CKxHxCvF:KLS6Uh/U1tVaoMY/LQAiPhCKLcF
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
en2025en.duckdns.org:3030
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 9 bitbucket.org 10 bitbucket.org 7 bitbucket.org 8 bitbucket.org -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 2696 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid Process 2448 chrome.exe 2448 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid Process 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid Process 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 2448 wrote to memory of 2760 2448 chrome.exe 30 PID 2448 wrote to memory of 2760 2448 chrome.exe 30 PID 2448 wrote to memory of 2760 2448 chrome.exe 30 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2784 2448 chrome.exe 32 PID 2448 wrote to memory of 2876 2448 chrome.exe 33 PID 2448 wrote to memory of 2876 2448 chrome.exe 33 PID 2448 wrote to memory of 2876 2448 chrome.exe 33 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 PID 2448 wrote to memory of 2616 2448 chrome.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\clZM1_NOTIFICACION DEMANDA LABORAL_clZM1.svg1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb459758,0x7fefb459768,0x7fefb4597782⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:22⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:82⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1548 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2204 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2200 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1172 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:22⤵PID:580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3156 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:82⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3208 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:12⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3688 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:12⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3016 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:82⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=552 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3720 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:82⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4200 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:82⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 --field-trial-handle=1280,i,8410037852638012542,8561411920023458863,131072 /prefetch:82⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2500
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap24254:184:7zEvent200761⤵PID:1320
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\" -ad -an -ai#7zMap11841:184:7zEvent23571⤵PID:912
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc41⤵PID:1724
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\" -an -ai#7zMap6407:300:7zEvent163821⤵PID:2124
-
C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\01 NOTIFICACION DEMANDA.exe"C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\01 NOTIFICACION DEMANDA.exe"1⤵PID:2020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵PID:2056
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵PID:272
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp18E6.tmp.bat""4⤵PID:1148
-
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:2696
-
-
-
-
-
C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\01 NOTIFICACION DEMANDA.exe"C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\01 NOTIFICACION DEMANDA.exe"1⤵PID:1676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵PID:3032
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵PID:1196
-
-
-
C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\01 NOTIFICACION DEMANDA.exe"C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\01 NOTIFICACION DEMANDA.exe"1⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵PID:1960
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd3a14553d42f5f9a5033f339eef581
SHA15ad9822efadcb77afd29adc0419e7d15be1a8ee7
SHA2564143763f9b4000dc0e5f1e59bfc4a20a1386f19ddf083bfbc4945cc402986b5e
SHA5129186085c29cde96af65e09f1712ce1514e2a7d02d635497236a7352e4a8a2e7c76ca92e808df28bf0bc50524805918c313592ff40731e628254faf4cab1c0f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a390827bee676ec7c37c53ae4fb1e5
SHA1b239600f728ace928b7af8245b283c2c4024ba5c
SHA2568bc7656ad7f126c42329575ea57cd256ca4bec84e58c6e2812c1d3024819b1ec
SHA512cb3145667b13a95912eea615e679bf9d9e87aecfcddfb724bbe3157854128c60b198c932bf5bf252accebadb979557eb31bc4e1dc1d7b3ded99d71b48c0d671d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578572d35a456dc47f8ef2e07cb553c3e
SHA1cb6ddabb7da92e6d23acd8539947d68378b5b799
SHA256487db6e694af1acbb5b3c3062d60c1522e55af1af9d4a957d211048e83235305
SHA512737f57befc73cd7cdcf70cee2072201d36b1256c86036d04ee182e9bfe7ea541e3a5aee0b81eb4c5526c1b22ee8e09d8915b67f7bbb66d6083f82bd86175a81c
-
Filesize
877KB
MD5aba0a6150c27bf6b6cbb09df90231d6c
SHA18ab34e36553eb096268a41bde67634ee1b1cb881
SHA25681239bd303b28a9e6d5da5436b83853a47e2e8ad26aac557060b92854f8e054c
SHA51298ef24afdbc9d1f449d596b86267c5509a19ec922a1fd5b69e0cc544d233f8f5e21b0566a12528764d6c9a72c9032b81b8e15e009c4942e7edb264cd30a5aa39
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD575e441e4645f35303542aa10491b2d99
SHA191e7895eba659fee150121c293dd70f772fd145c
SHA2565ddbb78556373ee911c1a4cd1f129776b4c055b13ed6c6a2a4c219a8e386f824
SHA512be343a1a93a097d1901413b4b7c37d55537570b0eaf84ab4e721059b0481932dc92a8624546dcacffa194c9dce4823620f01e9804a5d60d7e0164dd0c6557eb3
-
Filesize
526B
MD5f8b4ca34258927336f526d2988f32a30
SHA1a76fdafc349c4d954a62c86e82e4bd3c2a3ea2a4
SHA2569d1f4f14c58d89fc6658dc0e562250446ca9b8ea01b4c242307fb524bb3fce08
SHA512cba30efde0ab49f97792d3bd7f0b98dc68817dd71ff239f33b53b47bbeec0e744bb5bb068a82a6383f6bfa73b5b9ae16782e8f5f6bc4ba0361bf21ceea361ef6
-
Filesize
5KB
MD53cb8a0d94377e100094b5a3076a6208a
SHA1d52eb4c3977feb5e9a214d361f64c8418d83982e
SHA256ea5e96fd330497a24636e9349c6b0c715d724c545afc4c5fb86ddd6ce6cdc672
SHA512518c5c796814fc46694043ce739e53582b86365e2363253048794aea7a149f03136e1d3a8cd43df61d1ac6b5b8f51a20cc75e78593bc2f8f4fef5f3ba15483e6
-
Filesize
4KB
MD5dc7d60effa348605a1e63cd6746ba943
SHA1951b57526cd9d818bcde1743d7ea1b6b6256eb2c
SHA2564962b8bad508d0ef04970acfb01f3aed9aa3c94350b402a2d9a9f525390764ac
SHA51294ac0de69e379c7a53b1634e7f71bc3cb13a8f2fd64baf2b084599ec81b3b2599c5a2766753f7715f9324b05451487f1ff3e8dd1eb389bd65fa500630126afb0
-
Filesize
4KB
MD5731b63bb969becf9d89ef7c5907a8c7f
SHA1cfe8a0fd356af846def3c1e53d403a373bb18925
SHA256934f4ed805e1f628f9605bdd340c552da060070265831e2d74b2eefca075a810
SHA512f58da3c6b540e3a2bd4894387956c9eaa5ec75aca6038b3013793008746fa51490b7cd803a34d4b93538781fb7ffafc602cee658bc8f9f925ae40282d6e294c0
-
Filesize
4KB
MD53932677141e7b36569c342e5835cdc00
SHA18e82e45c74dfae1e1e91bd1940cb05424cfe6ac8
SHA2567a675e88d56665575a00d31881348dea4ab5b5067addeebadd6f45cb165a209b
SHA512d5a1f3597655b3948d4322caa9175b1252b51e8d777bef39c82cd5594533ef854dcfebc2795c60d761bbe7aad66e8c32f47afb7799341c798d7145cb519d08fb
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ecd365f3-543c-418a-b67c-6086906d2128.tmp
Filesize5KB
MD55d9d356bd92fa7fb115cdc8f92c1edc3
SHA1444b1b99f78a35fc993dba95de4d679b1804025b
SHA25640aab8a13753072725512341007ed0b62ed995a92573afe059407d50ec915b86
SHA5121eeafde4951ae66b877cc5b8af4004260cc8281e428bad7960dc0b25e15e6cf70bf736ba312df8fe17b57e4be3f09cd697fb8826cd4e0d1fb46d9c8ee1467d7f
-
Filesize
176KB
MD5ad15b37640ba204382731bf42c024e54
SHA18eae55f0184dc60f11ff088136fb8bb5dafa756a
SHA256e0c98e014581d8c1e1490cd12d09d3b5436ede3dd8098bdcd8a7625f5d7db305
SHA512bdf048ff1687e81beefdee808cc477a63c2c7c137cf5f5d2d6bee0a5eef76312ecaf609ad560477199692b6e8052f4fc1078e9a3ecf02422a198641a36bd043d
-
Filesize
176KB
MD53e0c386d69f9b5657eea4c522e592e86
SHA1584749502458db669ff19f39f5cd1e4d55e2a452
SHA256345c84f3a49a41ac11d87e487ced710ebeb58be43190aea65372e984ef880a86
SHA512cc8e0012a2e0d02cf77ad1d9db86f6aa396fcf9fcc7c81b3795f00a46e89b14078052d40194eb920cb34e9627c2d786996402930296f5e86a60c4ebbba66e51b
-
Filesize
777KB
MD5b239de1154cbdb04054971ac07c0cec5
SHA1cc191331a2f7ed588cbab074cf82c6fbd00a8fb6
SHA2568dd16e58095ebb0b539bae0d09c1a051d6c2f4fce16a2c940aed49e81f021f5d
SHA512d6823dd2faca94f299b35279e03e0fc96428fa7356ea0d5e2e3ef261741fd34095282747fa20e6c043b05cb7e54a87f83dc23b4d4650d3ff43af09c856f30c0d
-
Filesize
777KB
MD5e74ca7cdc2e566d80f1985325a344afc
SHA141c9bd4e4d94c616096226586e9aa135f1be2428
SHA256aa6b0d7d43b4ad297f27500ab3a25d49147463d934f08ac38501c3c704f11a2e
SHA512058d3fe46cff2053a2828dbff9909e0c744c981497a6bdfe30e4245a624f1064afa2aeb0973b252074c8c23dbc30596d0508e38873700c44bfdeef1724cf5b0e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
171B
MD5a0f530e0697ba37a989181eda58cc3f0
SHA11308f4de8c9363e465aad3ae66943f1a56eeb867
SHA2560e66412546b7cb0cd2990c333a81a85429f519b8ada33faf8509e216e32a2598
SHA5127db318112598662381e02cc48f331c6d4fdcd8ce1f2e8909fcde28584fdcc65bd0a42c84afda3e6bdbe74fa640eebce8c24053833728ba23e6d75d3e82bdb1f9
-
C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda.tar.bin.bin
Filesize1.5MB
MD54e355017c65694626a22e94ac138194b
SHA1433ccb4aaf005cf0937f2d77e2fdea219ffe8718
SHA2568cda643f865e893fcb2967bd1c60afd0e1213a8f6f3c991c3294532bb45eb058
SHA512e839333eaec30034bf590b0a5101454983f7fadb2a9cef6580ad2df9963530ff24c8c90190d33b5e70bdceb35f3b5f4a5f29ba0ff0747019a38628681ac469e9
-
C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\01 NOTIFICACION DEMANDA.exe
Filesize275KB
MD5b2d4b1d83945b5787d49a86c4f394e0c
SHA1334a5c434e5d5d0649f8224e449ca9aaf9ba6816
SHA256038d7b257b98421ad371189cf51d67f32ddad2de687c443a59ea74e4027bbf04
SHA5124e92c367991a30d81a718ef26e8e61d24a84d2b54b5d9c6555f319b186ed5bc29d03fb10929bdae4d37c4fe92b3c0be63ee1ed4b287df74af7644e65053222d5
-
C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\VCRUNTIME140.dll
Filesize78KB
MD51e6e97d60d411a2dee8964d3d05adb15
SHA10a2fe6ec6b6675c44998c282dbb1cd8787612faf
SHA2568598940e498271b542f2c04998626aa680f2172d0ff4f8dbd4ffec1a196540f9
SHA5123f7d79079c57786051a2f7facfb1046188049e831f12b549609a8f152664678ee35ad54d1fff4447428b6f76bea1c7ca88fa96aab395a560c6ec598344fcc7fa
-
C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\mozglue.dll
Filesize194KB
MD57404e6cc2d9f62c5e177c4635835a190
SHA130b28ef884cf45a37c49cce8dbe6dcff540bce5f
SHA256330a56e3c9476794228aaea8eebf5cb9f8daef95fea79b6f8a400ff53cade354
SHA5122e55632e9badb5a69372897cd28927e498d33f603d7dbd7d0d34b3df3a1039e24184b0061b7b1d7420a0730d443df16fe239bcb77484a4602cc055fe4c4c732e
-
C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\pfchyf
Filesize535KB
MD592fdb12486353451f7778d7184825f02
SHA1243c804ffcf43bf1db0d18936149683c4b83ca76
SHA25694a5cd76a59082a355bc2ae5029c3b173d8e2ee6f71bdb38e7074cea64ad15eb
SHA512c2db8575070f77c8684786a58db2a1caf2653b31bb4a04c418d9b4e35d1f2cf6046545bf27172a70b6271197da251bf0489c97b7d4ab49874d8db577e34fe666
-
C:\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\voxowyo
Filesize13KB
MD598f58df7527d25a5be029d93fc6817ee
SHA1eef239c6351ebb4baa73743d89a2e43ee029125e
SHA2565607c73c0fa49058359f425bfe1fab1db8bb08c47d317ff99364c9e851aab2e4
SHA5128187ed79fbbb410d1fade48c3a638a24bd550d3ac84dc0f2a9c06edb867296b1bdc1f95c2f35f98a78029b4a3f2ad39a23d63a923c3142f92fe6bae12ba84d7f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\Downloads\Envio_copia_de_la_Notificacion_electrnica_Demanda.tar.bin.tar\Envio copia de la Notificacion electrnica Demanda\msvcp140.dll
Filesize427KB
MD5ff877a5dffd764197250bd4ba28496b1
SHA1187b8e183fc3331dd4ba139333886ad1fbf333a7
SHA25683f935454ae8e450b6f042509ecf28cceff95edb2495c63a782b9d45c2eaf1c0
SHA512b9245353f8a8bce6f443345daf50e135aa9d84bcce4dc5fd9279216b99bc6a1fa409292e110132ad815f303f36006610d6907e9fc778e94977beb2332481d03d