Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA/01 notifico demanda.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA/01 notifico demanda.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA/tak_deco_lib.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA/tak_deco_lib.dll
Resource
win10v2004-20241007-en
General
-
Target
ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA/01 notifico demanda.exe
-
Size
12.0MB
-
MD5
a7118dffeac3772076f1a39a364d608d
-
SHA1
6b984d9446f23579e154ec47437b9cf820fd6b67
-
SHA256
f1973746ac0a703b23526f68c639436f0b26b0bc71c4f5adf36dc5f6e8a7f4d0
-
SHA512
f547c13b78acda9ca0523f0f8cd966c906f70a23a266ac86156dc7e17e6349e5f506366787e7a7823e2b07b0d614c9bd08e34ca5cc4f48799b0fe36ac836e890
-
SSDEEP
98304:ReAtQzKADvk/9TEaImN9/tiHBIn8c3hCEFRUTaZnPZOtXwH:ReAOWOM/FE1mNHiFc3hr7UTaZnhOtXwH
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
envnuev1124.duckdns.org:3013
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2436 set thread context of 4704 2436 01 notifico demanda.exe 85 PID 4704 set thread context of 2044 4704 cmd.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2436 01 notifico demanda.exe 2436 01 notifico demanda.exe 4704 cmd.exe 4704 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2436 01 notifico demanda.exe 4704 cmd.exe 4704 cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2436 wrote to memory of 4704 2436 01 notifico demanda.exe 85 PID 2436 wrote to memory of 4704 2436 01 notifico demanda.exe 85 PID 2436 wrote to memory of 4704 2436 01 notifico demanda.exe 85 PID 2436 wrote to memory of 4704 2436 01 notifico demanda.exe 85 PID 4704 wrote to memory of 2044 4704 cmd.exe 96 PID 4704 wrote to memory of 2044 4704 cmd.exe 96 PID 4704 wrote to memory of 2044 4704 cmd.exe 96 PID 4704 wrote to memory of 2044 4704 cmd.exe 96 PID 4704 wrote to memory of 2044 4704 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA\01 notifico demanda.exe"C:\Users\Admin\AppData\Local\Temp\ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA\01 notifico demanda.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
777KB
MD5a1af1d952c10c8c4d28cb799cdf95ab5
SHA14708eb66091e116bf880b2cbd23d7780239664a5
SHA256e77a8d7d104ff883ce61962d9a337f3057f873059b98a2746553d911e2a862ff
SHA512c545291803d8e246611555f4807be21dd3605188fabbcf134c3e78ad368a21adbf182e73e31e47f3147529d90191df6fc86b95172cb02da0c22b1bd1f6aad870