Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 10:27
Static task
static1
Behavioral task
behavioral1
Sample
NOTIFICACIÓN ELECTRÓNICA CENDO RAMA JUDICIAL DEL PODER PÚBLICO ESM CONFIRMAR RECIBIDO/00030 NotificacionElectronica.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NOTIFICACIÓN ELECTRÓNICA CENDO RAMA JUDICIAL DEL PODER PÚBLICO ESM CONFIRMAR RECIBIDO/00030 NotificacionElectronica.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
NOTIFICACIÓN ELECTRÓNICA CENDO RAMA JUDICIAL DEL PODER PÚBLICO ESM CONFIRMAR RECIBIDO/d3dx9_43.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
NOTIFICACIÓN ELECTRÓNICA CENDO RAMA JUDICIAL DEL PODER PÚBLICO ESM CONFIRMAR RECIBIDO/d3dx9_43.dll
Resource
win10v2004-20241007-en
General
-
Target
NOTIFICACIÓN ELECTRÓNICA CENDO RAMA JUDICIAL DEL PODER PÚBLICO ESM CONFIRMAR RECIBIDO/00030 NotificacionElectronica.exe
-
Size
2.2MB
-
MD5
d9530ecee42acccfd3871672a511bc9e
-
SHA1
89b4d2406f1294bd699ef231a4def5f495f12778
-
SHA256
81e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280
-
SHA512
d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980
-
SSDEEP
49152:rHOut2Bf0ajIM8XEEN6N0rE/I/vqn7krQEQusd5F:VbaMbXbE/I/SnwrQEQusd/
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
30 WINS
3010wins.duckdns.org:9003
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2188 set thread context of 2508 2188 00030 NotificacionElectronica.exe 90 PID 2508 set thread context of 3044 2508 cmd.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00030 NotificacionElectronica.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2188 00030 NotificacionElectronica.exe 2188 00030 NotificacionElectronica.exe 2508 cmd.exe 2508 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2188 00030 NotificacionElectronica.exe 2508 cmd.exe 2508 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3044 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2508 2188 00030 NotificacionElectronica.exe 90 PID 2188 wrote to memory of 2508 2188 00030 NotificacionElectronica.exe 90 PID 2188 wrote to memory of 2508 2188 00030 NotificacionElectronica.exe 90 PID 2188 wrote to memory of 2508 2188 00030 NotificacionElectronica.exe 90 PID 2508 wrote to memory of 3044 2508 cmd.exe 97 PID 2508 wrote to memory of 3044 2508 cmd.exe 97 PID 2508 wrote to memory of 3044 2508 cmd.exe 97 PID 2508 wrote to memory of 3044 2508 cmd.exe 97 PID 2508 wrote to memory of 3044 2508 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\NOTIFICACIÓN ELECTRÓNICA CENDO RAMA JUDICIAL DEL PODER PÚBLICO ESM CONFIRMAR RECIBIDO\00030 NotificacionElectronica.exe"C:\Users\Admin\AppData\Local\Temp\NOTIFICACIÓN ELECTRÓNICA CENDO RAMA JUDICIAL DEL PODER PÚBLICO ESM CONFIRMAR RECIBIDO\00030 NotificacionElectronica.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
777KB
MD5f4f8b63c3797ac1f209aabd2fd31ff63
SHA193e7945578835552cab38d20e00d16acf6b09801
SHA2567f09d69331997b7b32e9180dfbb631d32f015807191cd37c8cbc7b4a4a29c344
SHA51264b941d125171cf9a4f687e0bc1e2693ba76fcc06c602a5889925bbd468ce4bd7435c6f7faa793ab7041f231e11f22378519249a268fc9bedd2426faee5d1018