Overview
overview
5Static
static
4Fwd GPVTI ...IA.eml
windows7-x64
5Fwd GPVTI ...IA.eml
windows10-2004-x64
3ANEXO - PR... 1.pdf
windows7-x64
3ANEXO - PR... 1.pdf
windows10-2004-x64
3Outlook-apzs1fye.png
windows7-x64
3Outlook-apzs1fye.png
windows10-2004-x64
3email-html-2.html
windows7-x64
3email-html-2.html
windows10-2004-x64
3email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
89s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 17:01
Behavioral task
behavioral1
Sample
Fwd GPVTI COMUNICACIÓN PROCESO SANCIONATRORIO GPVTI - JEP - UIA.eml
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Fwd GPVTI COMUNICACIÓN PROCESO SANCIONATRORIO GPVTI - JEP - UIA.eml
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ANEXO - PROCEDIMIENTO SANCIONATORIO 1.pdf
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
ANEXO - PROCEDIMIENTO SANCIONATORIO 1.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Outlook-apzs1fye.png
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Outlook-apzs1fye.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
email-html-2.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
email-html-2.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
email-plain-1.txt
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
email-plain-1.txt
Resource
win10v2004-20241007-en
General
-
Target
ANEXO - PROCEDIMIENTO SANCIONATORIO 1.pdf
-
Size
429KB
-
MD5
16a2bbcc920a8da0d3235c717ad3fc5d
-
SHA1
94fe9337a9f9bf020fc773edf31cd10d7b12716d
-
SHA256
9bc0e2d6e49c1e1e00d79eb5ac26d376831296a85d86c2a77d3845476dc859b2
-
SHA512
a4919be3778c4d35b6e2f5f00dad0cf98f84f9fbe3f7d1782a869eec5f84d612e99752acd16429478fa24b39578afff9d26dccfba8cdd3078732a170ca137c79
-
SSDEEP
6144:Icyz/tjajOea1NYB2EVOJTfok9FHmoTh2l6fvxCpuqkDNW8tZXrDKXWcpyhpXZwb:ILFeG5EVOZNpPvUpwtZXrD2yhVo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 860 AcroRd32.exe 860 AcroRd32.exe 860 AcroRd32.exe 860 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ANEXO - PROCEDIMIENTO SANCIONATORIO 1.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD584ddba20d95d9e2060a391bffc36589a
SHA178c216bbab1767fe7a2f5c9e3837b96fdf9825fe
SHA256044ad8baceef183fb001d29209d2148e969bcd1d8e5d5b2ea84fa6de2514f1ca
SHA512cfc862b58012e9d8b0ad3220664303d9fc21ec93e31a7d05a36ff4011962c9f0a9c78b65026e8533f2167e42d1bad09444ea8ee73847ebf9d9df1d7027d2bc40