Analysis
-
max time kernel
372s -
max time network
375s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-es -
resource tags
arch:x64arch:x86image:win10v2004-20241007-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
20-11-2024 22:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/uc?export=download&id=1JLDIqPBwfFqOwOAI9gBaNliRmZFmgPGx
Resource
win10v2004-20241007-es
Behavioral task
behavioral2
Sample
https://docs.google.com/uc?export=download&id=1JLDIqPBwfFqOwOAI9gBaNliRmZFmgPGx
Resource
android-33-x64-arm64-20240910-es
General
-
Target
https://docs.google.com/uc?export=download&id=1JLDIqPBwfFqOwOAI9gBaNliRmZFmgPGx
Malware Config
Extracted
asyncrat
1.0.7
Z-Oct-16
pt4040.4cloud.click:4004
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Executes dropped EXE 3 IoCs
Processes:
Demanda_Legal.N°7278263..exeDemanda_Legal.N°7278263..exeDemanda_Legal.N°7278263..exepid process 4244 Demanda_Legal.N°7278263..exe 1612 Demanda_Legal.N°7278263..exe 4300 Demanda_Legal.N°7278263..exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
Demanda_Legal.N°7278263..exeDemanda_Legal.N°7278263..exeDemanda_Legal.N°7278263..exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TechDesignerEditor = "C:\\Users\\Admin\\Music\\TechDesignerUpdater\\TechConvertVideo.exe" Demanda_Legal.N°7278263..exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TechDesignerEditor = "C:\\Users\\Admin\\Music\\TechDesignerUpdater\\TechConvertVideo.exe" Demanda_Legal.N°7278263..exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TechDesignerEditor = "C:\\Users\\Admin\\Music\\TechDesignerUpdater\\TechConvertVideo.exe" Demanda_Legal.N°7278263..exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Demanda_Legal.N°7278263..exeDemanda_Legal.N°7278263..exeDemanda_Legal.N°7278263..exedescription pid process target process PID 4244 set thread context of 3932 4244 Demanda_Legal.N°7278263..exe csc.exe PID 1612 set thread context of 1412 1612 Demanda_Legal.N°7278263..exe csc.exe PID 4300 set thread context of 3584 4300 Demanda_Legal.N°7278263..exe csc.exe -
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Windows\INF\display.PNF chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
csc.exeDemanda_Legal.N°7278263..execsc.exeDemanda_Legal.N°7278263..execsc.exeDemanda_Legal.N°7278263..exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Demanda_Legal.N°7278263..exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Demanda_Legal.N°7278263..exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Demanda_Legal.N°7278263..exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133766155764058710" chrome.exe -
Modifies registry class 2 IoCs
Processes:
chrome.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid process 2332 chrome.exe 2332 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
7zFM.exe7zFM.exepid process 2940 7zFM.exe 1252 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
Processes:
chrome.exe7zFM.exe7zFM.exepid process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2940 7zFM.exe 2940 7zFM.exe 1252 7zFM.exe 1252 7zFM.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4928 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2332 wrote to memory of 640 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 640 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4364 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4268 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 4268 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe PID 2332 wrote to memory of 3216 2332 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docs.google.com/uc?export=download&id=1JLDIqPBwfFqOwOAI9gBaNliRmZFmgPGx1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd522fcc40,0x7ffd522fcc4c,0x7ffd522fcc582⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,12106039829171028969,2265031677843266437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1912,i,12106039829171028969,2265031677843266437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,12106039829171028969,2265031677843266437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2268 /prefetch:82⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,12106039829171028969,2265031677843266437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,12106039829171028969,2265031677843266437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4628,i,12106039829171028969,2265031677843266437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4636 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4840,i,12106039829171028969,2265031677843266437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4904 /prefetch:82⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5220,i,12106039829171028969,2265031677843266437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5200,i,12106039829171028969,2265031677843266437,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1268
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4928
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4972
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Demanda_Legal.N°7278263.tar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\7zOC7B53C3A\Demanda_Legal.N°7278263..exe"C:\Users\Admin\AppData\Local\Temp\7zOC7B53C3A\Demanda_Legal.N°7278263..exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3932
-
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Demanda_Legal.N°7278263.tar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1252
-
C:\Users\Admin\Downloads\Demanda_Legal.N°7278263..exe"C:\Users\Admin\Downloads\Demanda_Legal.N°7278263..exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1412
-
-
C:\Users\Admin\Downloads\Demanda_Legal.N°7278263..exe"C:\Users\Admin\Downloads\Demanda_Legal.N°7278263..exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD546e7f984716a7a9b9373fd309998bf84
SHA158bcc33311f15f9467c8733c855c2965c57935ab
SHA2565c75bf6faf433c2eac91b1b113a23f9fc4c4e3ac0d3ed8b9fe33e5b68606537c
SHA51240c447382bdf2ab1c90af458493d47a3c2593c4d1ad0e5893911ac7f76a0c386787765cc967624caf95352acdd1a08b0d60b2462d8cbec28e1c07cf1a58b9481
-
Filesize
1KB
MD5fd4b4813297659f4d269d90f4fde8763
SHA1098be4db80bad514196e3d9f0a431ae5839a446b
SHA256497e7da42e6728234834f047257eb9375308d82f92429b30b1316f4ef22f70e9
SHA5125a713aa8fda90c8ba7174ea8e8371d8eb37cfc0cda57e991f085aa557a13d2b629a54e683a129f86b65c00b918a70406706733f0ac24754c92ab61fee04568e4
-
Filesize
2KB
MD5613d6f320f8c6f233f47cb69fe998e0d
SHA1954beb6eec197667c6096bdfa9be009d47d85e92
SHA25602aeae6b40acec25777ec78c2cb970ab8f674839be2bc4bdc71e05788e39b21c
SHA512fae59321812033cefab7a2a4bdb38d37d9dcf0a8675b2f52635c642c3835f9c9a434556187c814b63c58ed0ea8528722a4f3c68941c1f6bd325cbd5dad8bb9d9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5ae4f7d1040a49037964b5276f02deed9
SHA12d0100ec36305c2e4a747737b7a0b3f115979fbe
SHA256826bdd9896f7d66af4f30b82cb85cb811a841446fa436db543d9994897a2e1cf
SHA512fd47ab0a2a1d86daaa0da2dc24a7c6b430bd47da48ec5a8481600611e659b5fb3fc9bf6905ea9308282622947e0b8d2471a12bf56d1512cea7e16f49e2a572a1
-
Filesize
9KB
MD51d643899ad33887ec71e1dd2c072694e
SHA1ceb2d040e2530fcdbe6e0e19c751477ca9b803fa
SHA2562307b92cee0ee6839a7c6e5ae917b8d3564163f145b013547c7160da7bf8972d
SHA512635b46ba1a8df5547e427a149b47ca7aa9d7401e960f4cc17bee1b1f907ea28ff1c1d1515418beb928a89930614441a375202d32672d6b43f715d6be0d4c7d63
-
Filesize
9KB
MD5b4ed00fc7aed5948d20fea68b5ff849a
SHA10a6c0991029579a903b8ff89c305fc27cdd6cb0b
SHA256a88d871123a31855b51ff69e421faa04dfcf4371df2f0ba6c15e4fcddd31a36c
SHA5123b33adf70eec241fbef4f8a7e754164b7d3b8210eede128105a1b0e9cdd471044519e483976363c1b34b8fb89a1354e133c518beff2cf01d61f42938f4e408b6
-
Filesize
9KB
MD5c68bee8b2f7e9667c43ddd60b0f71847
SHA13de0df4dbf5bfa4095d7f7a7dcaeab0033683055
SHA256ac3ccb057bd5208a53a5f3001ac1bafbdc53c0d5e747bbaa18df52dce47f47a4
SHA5123fbec19f5898b6497b84a2b91f4c21038e843f1123184fb8de0300da341276c4658ed2fd1ad276a7871273c0ac75896f0d37bd070df426f7be638a60680dd32c
-
Filesize
9KB
MD5dc80188caaeb4bd6f2d33952b657b850
SHA14e757d899dc2eb7b8eed95e9c421e908820b3b66
SHA25629c27aefba3172a88b78b892eab1a0772b73c91efce340132046e634988e45c2
SHA512d7f71792e8fceef9a1c904fbb892183c549ad12aec8ec39f941405841f4a19c488b5bf8267f803d525db5de04ed314f05e39a74dbb64c8d96a97034c7c73b7f8
-
Filesize
9KB
MD567cd0148a58e9c871c03331d91266627
SHA172507e0c23828db24b293054b02a1086c9300cb9
SHA256032a32e4174ba5f150d87b68fac3e9b54749393a015d98dd08bc47568899eb35
SHA51250a165d303b5c06e3bcd603f0533c40e9d5b3c2bba4de0f515ba5b43a2cd67319c3b9fecaf409113aaca6d881037d07d559dea39fcc4d9b09ce236756d818757
-
Filesize
9KB
MD5cbf971c529bc1bfb650b43641732c65a
SHA1e2d01de5ca43024d2598896c285779b811bfb536
SHA256dad210204d6889e99248a903f6f4b167276b8c7f6814239ae3a84d58e0a3d4e8
SHA5121ec9ba788bdbb50d06a3349f9ff6c5c0557adce3b876fe22332ce5236cb0c545fc79c29ddd33b897a98e6e6450d01e8691fac807c35067272865320f5dc1749d
-
Filesize
9KB
MD5e7d1c42af50c97c62ce48e62516ebe41
SHA14594f8b484091059518d7121899f35c285c1ac25
SHA2562faf95afda4cbdb7ca7f170cd5ac9443e8c4b209ae3aad7b36cc7ffadce7759d
SHA5123a353bb264cb8ab4cff822aa63e1bed1a9634bfc707ab8625d37c34779b91fef4865d45f1c95b6fd062bf3753bc0ac39ef22b27afcf2c257fd2dd8f7e67aa84a
-
Filesize
9KB
MD56803386429de9f4ea90510589b1972ba
SHA16a7b1f97dfd7c4556821317facc682d8b5f95b12
SHA256f58a37320abbbd993e9b9f257cc9df307924175324ed265da053594a45b47515
SHA512f213184e62f34a145ff71cc5c4f942ae60dd96d872ac485374da618f9e790755d53c20f4d7d5d2d4465cc8635a7b503a4a90b0e7a601412235321e5dff99ab7a
-
Filesize
9KB
MD551776fed951c97b0fabb03d6f5f0c2dd
SHA1abe8fbc004f68304bc4608ad20f28e1fb3bd4e5b
SHA256949d4e5607528e118874f25ea5dcf945798174e9e8ae21cd1e1692cbf5476c7f
SHA5127b2f1f73f0848874172aa4e68610ffe6c36358414fb062fb5d2eaf016da80de749733102ffb60bc2c748b373ccb1645b8c2125a5c8f4e2e07f1c6fc764a561d9
-
Filesize
9KB
MD5fdabe6805a7e2c7d0a349130dbc96e56
SHA1e0fac9740158c3d930b8520d73c1a135674563be
SHA256cfd73b6ab3e1fac4ea6529530f1d09d5ef600ca42c424cf6988483b6578907c9
SHA512242e9702571ce706a41e528839bdea4af5c7db87e2d0787b2cc046751ab78ef487fe787b5f358e2c601fb68fc18fca0fb65d293ed073c34697d8355687df85dd
-
Filesize
9KB
MD5bb7bb71b8bbd71b52161bdcca20a8108
SHA1d4734c1d7e4f973022d43674d59b23dfe3687ab9
SHA25647a649ec855bec09485057d08715bd26fc68ff31940c0e4e221895c30ad6e28b
SHA512159c3167e0bb6f5e19eb708d51a7854b6d2931eecb7e0275994ddf4ad108b4307ec7d20076c39eac0ac8cf5c6039efbaa47741b48ab023df3ee8aa4f9ae0a90e
-
Filesize
9KB
MD5fd386e387e3eec6961487156f7410852
SHA1f61d812adffb8eb37dcd8b5898880c57c491b343
SHA256a4685494707087961795ff26b9bb6f556e019c7103d2fdb1d0978f4049d5ce66
SHA512f824b90aed3eb63e9b5e6a09f4d07de62f5767bd88723dcdcd5c32061fe53cb17e812f55b1b44bfd28916103138d7ca0fd98955df05b76d8f08c0a6054b82a63
-
Filesize
9KB
MD5250e5321addc55ea7a991f597f63d7aa
SHA15ac2e3713faef8d3e6ebbf0ef108a3c4ccebc5bf
SHA256e1d0089a2ac5e807d6980bb2c949512c814802440fafa263c3e67cfb63871a9f
SHA512d0fe6312478d30aa30610021170f1ccf0c22f42c0f153e8b935b20d8fcaff2bd6f22537ae5d1464a8e3cb3829c8b619f08f725c1edefe99e7a2de496f00c439d
-
Filesize
9KB
MD5e637cb086c361bb8ecf6f1d29541fe19
SHA1a155b23e80fad64fd50d03deeffe353b93484108
SHA25623196056649a93e1426b61d7ab07575b07b8d463c0c1424dff598f02ef2e3d91
SHA512028a7208910b541d893a1cda3e213f0fa98f7a6e2a5a7dfb1b4908c7ea57c446426dfebb7bb2f0322067fc9dd48c67a05ab8fdce2aaaf46a0d65a2abdd4860c5
-
Filesize
9KB
MD562fd9d0a05810e0c7266611842d4d800
SHA1125f00fd4c1b3dfe9fc6a0bdfbac220fe8c693e1
SHA256877f0fe68ae2485a98c17669ca0b7121557f25e1bcbe48abd05ec6d96b98a1e8
SHA512414c4c033bfe0f94bd4a33b0c37bbdf02c37623d3399771f5614f58f5c1657ef8fca1429d4ef488c39b44599947dc7916fdff17712e406b1245e9886ec7ed236
-
Filesize
9KB
MD5cd207ae90c0726b9924977a7cac43a87
SHA14f8d1285033fc43a358cdf8645076d5691490214
SHA256c28cdeb0318e75e40b4eaf7b8b1fd6309bcb418884fda21d6517ad5cb0b69c9f
SHA512c75807a6a1cc91f33aa30f6344480550294a725fe81137576dfac7f756369c0fa2bc6feca5a9ba2c958dce549f4d412acf8a844e25d44b8a06921d29b8ed8da5
-
Filesize
9KB
MD5d10162ba617ed927d8a38dbcad4e949e
SHA141ffd1a17bc818dc2753012a960537c506a41c75
SHA256bf3de46f26fb33077c1091d4e37bce2df386acba893e72954d3afb5c00dfd419
SHA5128069e237e24a9d2052cf5b5802e84580e31abf1893ed070af8e380eae834e46b7021503f88784e8db6f505fa67e9b352ae75eefe110e184b4216e49329c1b96d
-
Filesize
9KB
MD51274885412a10bb7b617d98e03a442c2
SHA1b0a997ba4cf847ce3d8c5e04b48b3ea185b5fffd
SHA256661a6b63eac1c3566f8f5b077a9d3bcbb9720a6d50d5b00eaeaacb276fc27841
SHA5122f7a838eb91b6578e41f96d9d4ec45eaeb1bb693b0a5fe24333125650cb48420e97619a41f94391b2707a30f87171614a7858729881e929e33325f698b2da028
-
Filesize
9KB
MD5e7a9c0d9a1a6dcc72dc1f03daf88fcf2
SHA169cc72b369a5b1f408785e79e4553330f7850308
SHA256f8037096e836a9b23bf5ca5f19340edf266e5621b898745f7fb85eadeb1cbb6d
SHA512552e1854bbaec12247c231f13aee71b52f447e91c4e01dd9067c9a33216f0eb92fa7fe6a469efd9719da966a3ca1a355c5d366356f0619765aad91a1441d5384
-
Filesize
9KB
MD54ede5a07626494224ae804d3c334ce90
SHA1196824ff04ff8cdd84bb161949b745631dfaa4a5
SHA256abf2affd3eaa60ccf2d1dcc06a822b6d519bfe8ecbc54c1ea64e6f7cf51b6893
SHA512f26d84bad2aa0cec3012b8bdb8dfb331df705e14c59f402a430c937564fb8467c8902852c375f67a3cc42b94d36b805757641179e8bb0ae657b30f4cafa01db3
-
Filesize
9KB
MD5c4f372f760acaaa074cc4cd76fbfe671
SHA1e24fb58c75b19a9530d90e914024edbb13ac33dc
SHA2569ff45dec05aba7483eec23df7dfc1bd3bd49c2bc51262f45954a488325ff6217
SHA512090bc411925d57248bbc3bb62e60171afebfc018dddb40964b4bbb4dfa335f490a62a51dd5914677466cd69dcb281da9671564547fc808e4447451fdb7f529f9
-
Filesize
9KB
MD5f1dc5bba177d4f293a18ae0d6475de48
SHA1a96ac7b9d8a791a56b0e8769d2d2f2f907fe37ea
SHA2568943346911f46ff59d0388cc6580b8e774b415f7e75f2ab5d9d89f0da73b5daf
SHA512e457e80663f22a9bad57f0b3fc32f5c5fe1749a78540a73032d31c80ce008fe9efdb94f2e729689c6e2aba9bcf7b5457100b1708db3855b448b5e232ea7aa788
-
Filesize
9KB
MD5ab93d257826e523e4300bebfd791e8bf
SHA11fd825e264c1cc7128fa250a2003a8731f355eee
SHA256c234a8bb02e775fb4530d7b11a7fb67fdb93b18fed5fec3e5240998b9f7ff4c5
SHA512e2886b4fb649b8188fcbda9db9a9b1e48b962dfcca544fb9121989b68087e27c95031969df215bbb883166cba01a4d76dfcd7e09e7dbafe559b637d73d4ab2b2
-
Filesize
9KB
MD581a5250ec79633f94be3b69f51a47b12
SHA153690a9736584f81c52121651f6588bdf71250ae
SHA256935a9206b53e09605906f83bf9c21f7c9eb547447df6a190e39691419b187602
SHA512694e927462d13959d882bd420dd554ea3f6eac4a59e554f2d83d5494f45de2ee5b3676c6fd1bd5d8b8f14833aeef336db91305c919cf0985e53719d1c4ac3994
-
Filesize
116KB
MD5fdb8099ddc371f4447f49891682046c1
SHA14d65465b53b8cb83a1a3b6cd0f2e2b4ebfa9194a
SHA256b10ee3f2277983269f15aaad4d625ee70e7459ac79a60e9697db64b2dab41e31
SHA512fab738bffc6826e7be01cf6ef332ba56ac54aeb01f2da327582d0792949e260ccb30ffa4ffdf05f5f2880592dd3fb1e635c3d4c065b299d229a16d43021a2d8e
-
Filesize
116KB
MD5cb249c503eee9fffc9687833fe7a534d
SHA1132dcf52d14c300cc86c2e3666aa19f1de42e964
SHA2561d2303f7316cb2f6ff49fe64c933f0364b98f30854774d16f0b1089dc667c49f
SHA512a7e8af9281b588100cc8bfcba356a6c38c769143563504be0c85bb93b0a6517eb7397f59e8fb323d5ea591deed0ccc9a9081df87816b50fef8a063cea1ebad4b
-
Filesize
116KB
MD5f8487d687fb0add63c72ed11db795ace
SHA18efe731bfb01a0d1c90228e6bd2aa57445a2f5ed
SHA256b6310c6397ef9a4b93348133f7323ca31927242530781ad826f9cb31958060db
SHA5127d3fe59a8933d919480e5e4e510dad71b451e94cad101c1801112f72cc1a04feb1f0877fc1d28660190d318e27bf12174a7c6bb081d33bdddf7ce688477a2a88
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
2.5MB
MD549ec7b0a10c0c2fddf8ee9931e220a87
SHA154389b474b33191afaf45fb464199f1a3089154a
SHA256edd192a65b9a5d7df1076294077e896a872bf8c6c1ab8799415f1ddaf32e0144
SHA51212b51b3782016b178b963ac7d598baf66b1c14bd04d5171c568ee82eea5f5e51fadace586053f726eb894c8f8a1dc2027e80d1e8aab5284c00c55f0705ff83a0
-
Filesize
886KB
MD5df7bb250b6147f305194312f5e4cf1fa
SHA133c0bb81149aeb8c786fc981051162e7a101d07f
SHA256508c19196d361079268da5506273d2ba60c45ed443a1f543afe383ad8a69c912
SHA512f3305f880038d98ad6049657b4448a7fd24fc877aa3a6c0f81a446fb9d04027efd537113c9755d9cb0083bcb7773d6023c46fdd8b5d004a31b81c39ff4c0ea66
-
Filesize
882.6MB
MD5f0fee0d459651fc6736178a1bbe5fb62
SHA15255f1e0d4092e4df9e907e3965e708bfa232669
SHA256403bc731b9bb2a0058a0e205fc9ac99790a58b21b3fe025b214b824e894dee98
SHA512c16286cd4a9d17da8a885093e0b445fffb1c2a29b0837b6214446668db8481f7ed0bc9f78bf6bda57653d62041c7da0418dce2b522c81d9e22acb44e26a02613
-
Filesize
12.1MB
MD550631ce1fefa133a3f957660ca526f9d
SHA1ec7f5b73e7fd9a925bef2a34eaa0cba07f30acc8
SHA2562fe1ab54c357ee428bad388a6c3ac7facac79b0f341ec1c0731321128c7f4987
SHA512573322153ac9d9aa50e34c1c66840c7eeacd3aa8e5468063f63fdbc03b290b2f9d4e2f4547282465aaef770a7b7e6556d2f3790a4b451afc3d493a6b3835bf5d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e