Overview
overview
4Static
static
4ACUERDO CO...da.pdf
windows7-x64
3ACUERDO CO...da.pdf
windows10-2004-x64
3Carta soli...GG.pdf
windows7-x64
3Carta soli...GG.pdf
windows10-2004-x64
3FACTURAS A...IRE.7z
windows7-x64
1FACTURAS A...IRE.7z
windows10-2004-x64
1FACTURAS A...04.zip
windows7-x64
4FACTURAS A...04.zip
windows10-2004-x64
1ad09016288...04.xml
windows7-x64
3ad09016288...04.xml
windows10-2004-x64
1FACTURAS A...05.zip
windows7-x64
4FACTURAS A...05.zip
windows10-2004-x64
1FACTURAS A...07.zip
windows7-x64
4FACTURAS A...07.zip
windows10-2004-x64
1FACTURAS A...08.zip
windows7-x64
4FACTURAS A...08.zip
windows10-2004-x64
1FACTURAS A...09.zip
windows7-x64
4FACTURAS A...09.zip
windows10-2004-x64
1FACTURAS A...10.zip
windows7-x64
4FACTURAS A...10.zip
windows10-2004-x64
1FACTURAS A...11.zip
windows7-x64
4FACTURAS A...11.zip
windows10-2004-x64
1FACTURAS A...12.zip
windows7-x64
4FACTURAS A...12.zip
windows10-2004-x64
1FACTURAS A...13.zip
windows7-x64
4FACTURAS A...13.zip
windows10-2004-x64
1FACTURAS A...14.zip
windows7-x64
1FACTURAS A...14.zip
windows10-2004-x64
1FACTURAS A...15.zip
windows7-x64
1FACTURAS A...15.zip
windows10-2004-x64
1FACTURAS A...16.zip
windows7-x64
1FACTURAS A...16.zip
windows10-2004-x64
1Analysis
-
max time kernel
197s -
max time network
199s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 16:44
Behavioral task
behavioral1
Sample
ACUERDO CONSORCIO ADV-ISES 2022v2 firmada.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ACUERDO CONSORCIO ADV-ISES 2022v2 firmada.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Carta solicitud acuerdo de pago - ADV-ISES GG.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Carta solicitud acuerdo de pago - ADV-ISES GG.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
FACTURAS ADVISES-AIRE.7z
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
FACTURAS ADVISES-AIRE.7z
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-104.zip
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-104.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ad090162883302124000FE104.xml
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
ad090162883302124000FE104.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-105.zip
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-105.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-107.zip
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-107.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-108.zip
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-108.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-109.zip
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-109.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-110.zip
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-110.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-111.zip
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-111.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-112.zip
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-112.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-113.zip
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-113.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-114.zip
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-114.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-115.zip
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-115.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-116.zip
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-116.zip
Resource
win10v2004-20241007-en
General
-
Target
FACTURAS ADVISES-AIRE/CON ACEPTACION TACITA/FE-105.zip
-
Size
656KB
-
MD5
b6d1363e20121cb9774242802f35d62a
-
SHA1
262516a9be2e71425270aab9ce3a358b652f2346
-
SHA256
420d6a8ae38b7f50100a315d65817df53c702e5940ef340cd99540cb1157f258
-
SHA512
4ffc1f2311ea2a41f3ff396cb6ec9e03d1b6926193a9bcdb9541d89a5c5f6715b51a3aaae9a34012622ba030437e4e1c365cdad6383dec65016d04efa8f8c0d3
-
SSDEEP
12288:UgFhN8l2knErvyzB0cse40SqsMXfNaIsGPxf/JCWVaovv1DSSP23E7z:UgeDncazBZse40zsisi33X1DSGgE7z
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico 7zFM.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSOXMLED.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438369701" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\MINIE IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000dfd7b9f31fc6285484ea73d64b104383d4763efdf47747121caea3d1ed6b4aad000000000e8000000002000020000000ca2da72ef4ffb71d47af7e5023a5a8cef662e9c33176b19a3d28398dd7660c5e20000000d844e30e23a677882a6657d5cf1da67ab77aae18b6fab20effbc555db72b426c400000007f32c049b5ff822e467b9b9b3a4e003e64799b56d441f7258d8409071541680250a96914e5fd0aaa66c827ddb6099b75f8f40d14b01b58ef8b43fd6f4d931913 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a68c8d353cdb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B919D9A1-A828-11EF-B59A-E61828AB23DD} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2836 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2308 7zFM.exe 2308 7zFM.exe 2308 7zFM.exe 2308 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2308 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 2308 7zFM.exe Token: 35 2308 7zFM.exe Token: SeSecurityPrivilege 2308 7zFM.exe Token: SeSecurityPrivilege 2308 7zFM.exe Token: SeSecurityPrivilege 2308 7zFM.exe Token: SeSecurityPrivilege 2308 7zFM.exe Token: SeSecurityPrivilege 2308 7zFM.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2308 7zFM.exe 2308 7zFM.exe 2308 7zFM.exe 380 IEXPLORE.EXE 2308 7zFM.exe 2308 7zFM.exe 2308 7zFM.exe 2308 7zFM.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2308 7zFM.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1792 AcroRd32.exe 1792 AcroRd32.exe 1792 AcroRd32.exe 1792 AcroRd32.exe 380 IEXPLORE.EXE 380 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 1816 AcroRd32.exe 1816 AcroRd32.exe 1816 AcroRd32.exe 2836 EXCEL.EXE 2836 EXCEL.EXE 2836 EXCEL.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1792 2308 7zFM.exe 32 PID 2308 wrote to memory of 1792 2308 7zFM.exe 32 PID 2308 wrote to memory of 1792 2308 7zFM.exe 32 PID 2308 wrote to memory of 1792 2308 7zFM.exe 32 PID 2308 wrote to memory of 1188 2308 7zFM.exe 33 PID 2308 wrote to memory of 1188 2308 7zFM.exe 33 PID 2308 wrote to memory of 1188 2308 7zFM.exe 33 PID 2308 wrote to memory of 1188 2308 7zFM.exe 33 PID 1188 wrote to memory of 2012 1188 MSOXMLED.EXE 34 PID 1188 wrote to memory of 2012 1188 MSOXMLED.EXE 34 PID 1188 wrote to memory of 2012 1188 MSOXMLED.EXE 34 PID 1188 wrote to memory of 2012 1188 MSOXMLED.EXE 34 PID 2012 wrote to memory of 380 2012 iexplore.exe 35 PID 2012 wrote to memory of 380 2012 iexplore.exe 35 PID 2012 wrote to memory of 380 2012 iexplore.exe 35 PID 2012 wrote to memory of 380 2012 iexplore.exe 35 PID 380 wrote to memory of 2656 380 IEXPLORE.EXE 36 PID 380 wrote to memory of 2656 380 IEXPLORE.EXE 36 PID 380 wrote to memory of 2656 380 IEXPLORE.EXE 36 PID 380 wrote to memory of 2656 380 IEXPLORE.EXE 36 PID 2308 wrote to memory of 1816 2308 7zFM.exe 38 PID 2308 wrote to memory of 1816 2308 7zFM.exe 38 PID 2308 wrote to memory of 1816 2308 7zFM.exe 38 PID 2308 wrote to memory of 1816 2308 7zFM.exe 38 PID 2308 wrote to memory of 2836 2308 7zFM.exe 39 PID 2308 wrote to memory of 2836 2308 7zFM.exe 39 PID 2308 wrote to memory of 2836 2308 7zFM.exe 39 PID 2308 wrote to memory of 2836 2308 7zFM.exe 39 PID 2308 wrote to memory of 2836 2308 7zFM.exe 39 PID 2308 wrote to memory of 2836 2308 7zFM.exe 39 PID 2308 wrote to memory of 2836 2308 7zFM.exe 39 PID 2308 wrote to memory of 2836 2308 7zFM.exe 39 PID 2308 wrote to memory of 2836 2308 7zFM.exe 39
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\FACTURAS ADVISES-AIRE\CON ACEPTACION TACITA\FE-105.zip"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7zO409F0AA8\fv090162883302124000FE105.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1792
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\7zO409E33F8\ad090162883302124000FE105.xml"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:380 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7zO40965BD8\HES_1000020686.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1816
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde2⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b313e2040325aaabfc27a681fabe944
SHA1177aa08d5cc3158eb8a43bdcdb3583aad7806ba5
SHA256bae8eae0039036c91a1376aacb706cf83ee48e9fb8f6742a085692108adbd384
SHA512c6045bf21952daf8c71b9010716730cc478044e2041a3e0e59c1696b9fc2e354cb479b2a1d6a94badb20b432a8b9a7084cd1e99b57f5a4adccd0ad6e67465c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55606a8886aefbb5fe257c96a1bf849c3
SHA12718292e7d335b8e5846c0fb22afe4bffd93e5cb
SHA256c176c4fcd858e5614bd17a042dcedbeb4c1f22870dd5f6b2a7530b7374bb7042
SHA5121728abd17e3552e2029fc4e5e51faf26e91f28ca25a6946fb8318ccd67fd2553f5f877f22ecc77cd582aff31f3d941e22313bd016592a845261960a9527d1d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5240e84827a06a378cf990a06c16ac
SHA1b4e45b95f1e1651572ec81e395fe8f6cd59b96f4
SHA2562cdb8b88584fd486efeee870d75872c91231506793f13644367cdfd9b5edbffc
SHA512192871e1602a3b0adad4ec4a44b8316484386c39ee467a900ae2e1f582978c5129975136513faa1e0975786ccdcb0488e06c82fe8ea4f011615ec6e05df0ade5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8eae47ab7f730e352fcef4452958678
SHA1f06b7d1b70b40833a2798b2de6cabedca1d10eda
SHA25664eb64492b562f32d72a239b3013fbd0bf12d0832f4bc3c8f209816becef1553
SHA5128efd5352f0d827cad8e1dc85879352e187780f7b5e122b890f8761bd6cb604c0b33fa043c6204082158c81448d9dee6065a41abeb773387896945ec44f2cd89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5366f722fbd294c52c3b42b3e2d40e90e
SHA157322b54d1349dbf1b6fb6c46565fdecd1bf2728
SHA256ecd9bc253ff197c1405a23692e939a8663b552e87029ca1a3e8e90c581286d57
SHA512f9b8f455801cbac01c97ee29502db5ba4f991c2d89dd10b9004c4e785aec3906285abd8dab4daa11bd3db4ff1618d1bfa382c769d50d5d7a1a6991a2e60fd064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb07f8c3e4434dbfd743af4d13cccf9
SHA1ee820e41b47963042ad3ec48b23c6619491541b8
SHA256150655cba5c7e4bdb7ac2b8aee68959163312be32ecdb43f86c6e40971cd3c6e
SHA512ec4b72a466db38f3cec50ab4d07e6cbf82e7f4cec7d7b6bc44e35b3422b2576327e6b7526094f2929ac4252ed42807ad9476b5a651568f58d74ba970a4c988cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f9a572df10a5a33dc41b71e762b2b2e
SHA1a96951d129e69a4ee95c86c0a583e9a1a910aac8
SHA2565e430f3bd0c78b78a06d8f584f22d83e96dfc42628a33d580e46a821b63203c6
SHA512dd8577c4ea608db74807331ba282c62de304b00dc974de41a7e2f3b49bf5bc4052a507ef01a1351fed08a7e53636101ceca5b5682a1135718755f88c6189048c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a535602f15a7dcd958eae3fa3bca80
SHA11e282f49652b3f7928dd8a714493b84bb02160cb
SHA25633f86599e9f8c9fd6df27f8a312f8a73a2140717c7b4fa7ac5ebaa4232466ef5
SHA51297abe339ef21ccc0dda8d2914b9838684cd94929c4d0bd9401c56020c57047702b6a9d2fb356b4ecff200b946f29f7a1603903775b5b7b3bee9cd50170c00ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9eda4bf31293479bcb77e484dc8aa9
SHA16c3d4284dc8f7c49729d7932d504560cdc8d6a97
SHA256c3d4ce9b09f014e2a21fcaf7c0484aede80b025d1abfabdcdbfa51113433d085
SHA512ebb78d1f561ed7e1c581ded3e89208c39727b07883c4e990e4658d486bb694d009ec677f1414ee78747dbab55001f1855fce50e4299606a0e6c60739428a8723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb21409deb4085ad327e8823afd35c8
SHA10562c9b06017a22bf6bd18957a3b5eb961a2a03d
SHA2564d4cd74468c12169730dfccbfe0acb393077ef3ca06bf97723996826f677d303
SHA51234b9d64c7cba6ba395d5160c1d210c8a3a3900e855521b69f3e40ff11dd93a92561508207e38c779510dd5d8312055d2ee27ce790edd7d6244c921cc2bded6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ed737847ca0368ac3bb98400abae77
SHA12fb72aab4f624fa9c1d293f989beff768b057a54
SHA256bd41ce47cc14d96c2ed1a30bc5be1ddf5adf3d893aabf73c00825816ba64938e
SHA5122580119af4307b0e7916e8ef4c25dabc5671968336c0326c976ea22410a2f223c271a8ad0171a17887a54c69f7650f6e5c38516591ac28e5454c3ff465a28e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934ccaca5c9db2c5428329722d312f49
SHA13664415a2a6ca8245b43d979ece1f7231970be06
SHA2565b3fad32168f6eb38b088f7372ba0e4720e4181217e9a269e47f56357912a304
SHA512321e0aa64594fbb0c9da53eec1467c329fc221035d120f0514515f4331dbc26b2c2df0418e83159d21bde7b00932cffa34fb86e575615b79c6945b1ca8072e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d74f652788771d506aa09b395aa87813
SHA123670b34e2b7d86d6d79faf28048548fb44ccb6f
SHA256152235c0dce0caded9e847177b2e8419dc42764fd53343dccbd7121b50967c0d
SHA512747be2adce4987fcd9ace6e8b4f91f455ee175dcd0ca960f42492c400b59874f376993bb2089e24796ab9c8c1dc1aa3768368b4b6739df43b40c2194ee7644d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f37f2c61e845b737877d8875fb0e3f
SHA19049aad12649329625f15c8b2b60eb849dd6f7e1
SHA256bb55c15a1d51c962f811ad6353d5481d44b279348a86ac7e7e08e89285e5cefc
SHA5120a5ac99179358659c53a66b9a35b9d337458934538c45324571a20b6dba836d0326d9ba5722a0bc696c963bf3990ddbefb2f9bb1249892a42dae729f4ec69c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb19e6930056ec3e30d632e8ece59f4
SHA1546227767deedf2c17e9186e5f457d5f39c36209
SHA2565773f20a8e980dd7224c29f797b003a64761ffbc260ec45899ad4f5943a543ac
SHA51238230979c82b19d2c82c5bc6c40d23eee8485c042ceef161c792a1402220d86b05ddba84a0777dcb6bf9be911892404fe27c4e1506d608ed3e9fe082811b5559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51390a67c433cb918e2ed459c20fe94c1
SHA18f89ec544fbfdc650b7e17ce15c6cf32e288a0e2
SHA2563654273bddde7f7f07b52321c703984d98d0ddc744d1c6931a1d8326f5b1b985
SHA512f2551ff6f8a8e43b38ab2db9302c7e00bb2faf0a8e0fd11c69e06262c2a53ec93377d602af7e8597a31633d9e7fe3aeeffd856590d7f9d48274a8c3d40cb29a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dade6bbb166f5d5a9edcde4927267c0
SHA1067dc307e86a89bd015a1c83648fb69e6e3f884d
SHA2567d4a424f2d879bd6d715133baec49b77ea31b34d6a3ea392fcb3f85dd5d3cb2b
SHA512a442a672cf6180cb49a38985347bd2595cb3e3c4844cb0f596c0293f75dd005f7d7d7a03a87360bfc069458f77d789d67cae80df35014d0890ee2ad5fb204d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5116a51f8089af0512d31c2991803f885
SHA17112422b83468ec44c19e6878a5b2aab992659b9
SHA25628b83bd18eeb588df56dd42556ea00e28ce2f3ef4ca064307413786b9d06476a
SHA512798fc3d82b1529c9c8c22504a1374a0b33544cc129a6fb584bdd039da4557302f4d7a5d45f0c0391136af3ac00005a18dd6386797af02d5e8139ffb350d6ec0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710d2936ae4ef1a642db53d667f59a21
SHA1bffa464909c6d02dffecb2fb0e64f95b4bdf0676
SHA2562208fd915e21db601cb233698cf02adc0dc61d105257f97cefbd55d01102d223
SHA51249cd88c8ac6ac112bfbc0e766624a95179b06b43f186f2ddf78451140c1e4dd67783b82599c17bb041b42e07842597607bc73150afb90eb32cc214ce61917fb5
-
C:\Users\Admin\AppData\Local\Temp\7zO4090BF09\Relacion_servicios_prestados_por_municipio_air-e_FE-105.xlsx
Filesize104KB
MD5381f7216fb455044c3d81d23d4e1f552
SHA16a3470358b4da1a8167af06170ec473cef238cec
SHA256259f0b1b9a047ac6748a1a1b0766f3045db9addffad2859a0907e42852c47a2e
SHA51263368503bb5369cd7ded3dbc00ca7c27c4ace01bd253096d70eefdbfe1dd3468c178aa21daa06657c0358caaa511950dd3be48d711e58ff9b724b20b31a0a2f1
-
Filesize
531KB
MD5a31337154e943951d9d8cb1e6f2b306c
SHA17dab7241a23eb6406bf6ebd21344fe19d9d37590
SHA2562c940eb7371e0d46e47c8e0e3d9172e5358b6da5b15257c5efcedb09a5df4454
SHA512726ecba334aa7f6a1119ad92f5797b417200b76089870b9aef8421384a5168d1dadb98fa39564b184e0db9fa49bab7d03e8d2d93f7b8197750ec1aabd843b06a
-
Filesize
44KB
MD520a6e9c9485c824790d0a7ed50496205
SHA19957505bf3938c50f13e4352d0de217e1ceeefea
SHA25600986e32d94a376ba595f4b63d8fbecaf8adcddb55c5eb113c5c63cfec9c6f57
SHA512263d1dbb393d1188dcc777ed1a330ec345218c563dbdfe2cd798f57f9649d0bdd9e55d8f38404929d8c51077843bce59eb3ffbf1bf11b1dc50c3ebdd2d601d6a
-
Filesize
56KB
MD546c960ef230a5ec8edb613062150c59e
SHA1b0d3a0d6bc6d98dc8edbeaa2512234b4b1cf567e
SHA25663bf1a3962f66a9864927aa7fb1cf680fa87a1d606ce2221bc7746214b4dd2b4
SHA512ae0a4ac446c24eb1d8d6e5caab91678b853809f97dc81ce3bbc1dd5a4a6357564a75cfc84e43261e7dd345fe43d54e2db36422daddc0ec09e5da32b5852ccd60
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
135KB
MD5a3e82779d757fb4faf9cc73237c18b8a
SHA1ea034b8be607b5244f71e3611aea533aba490177
SHA256d4c9d7a37ef7b1dfa3411ff02127df69b6aab8f3e08abd8dacdaae5fb9fe0d9a
SHA512b256f6f0e2566d86188ee56c9cf0e5ad28231a92cbea8368a178347ac75fa653f964340db541bddd7c7de7f66b918f2c51a4e8243b504b475c9ac09dd760c44f
-
Filesize
3KB
MD521418b4189d8dc907cf48ed447b99b63
SHA1fcda95ae4a364c234e2b8479ec08b947469d5af9
SHA256c8b7d5a9560dab14d2f5b8173d0a4c43e5b3ef6162208b6d56f1a6df662a316e
SHA512db8c0c5e15b20d5da06e1ffd02a3c2cbf9fbe7046622f69cf332e93f55e36358511396768eb9c8915ba3463f0d874e29315eaba0b5131048b703442ff544aebd
-
Filesize
3KB
MD5ae7b1712a3e37b5ee46fa7960ef3fd1f
SHA11126a2ad7dbd85467ae193ac8b414fc7fdf42eeb
SHA256ad51d1457ca8b910bd3157476f551cae9336bc95a3cf3eb700f6bf6b38947821
SHA5122b905414277dca12d6d2aaa702ae3f552d05160dae79807bc8d39d9584be9ae453a360ade07c01b9fa5c71b1a43133baf6cfcd9654b4d132323f35ce34efd31f
-
Filesize
3KB
MD53870749c9d866f3f7622493df40250ea
SHA175cfc97f622b4d63eaaee4b8b9eb2d22b0dfbb9c
SHA2563a40862bfa4c16d4d5c160569114d433f2d468e5a80abb83fdd1e4fe8496f6f5
SHA512b15220e22c87f34b14f91547b2878d25ab8d6bebfe027a7d7398fdd7a9861ed27767930f620e134cb77e324a80ab312a5bd9a56f62122c0d1bad298c56689b32
-
Filesize
70KB
MD5dd328ce8b6f5bb5d2cb80fe21c97d75f
SHA195a4f759438cb451bf814e93ffc84ebc8dc4bbd7
SHA2561f956ef4b954c2d4f38516db3fa2948fb7a53f7ccbe893d9b38467c84746e7bb
SHA51204bfd2bda97026e326ff983ca93279c080179401cda7869771d5011f926716f1c405cf7efd6ba63be19b224ef77205630c67d05f218ccee9da3e6ce2d0439b01