Overview
overview
10Static
static
3NOTIFICACI...ca.exe
windows7-x64
10NOTIFICACI...ca.exe
windows10-2004-x64
10NOTIFICACI...re.dll
windows7-x64
1NOTIFICACI...re.dll
windows10-2004-x64
1NOTIFICACI...ui.dll
windows7-x64
1NOTIFICACI...ui.dll
windows10-2004-x64
1NOTIFICACI...rk.dll
windows7-x64
1NOTIFICACI...rk.dll
windows10-2004-x64
1NOTIFICACI...rt.dll
windows7-x64
1NOTIFICACI...rt.dll
windows10-2004-x64
1NOTIFICACI...ts.dll
windows7-x64
1NOTIFICACI...ts.dll
windows10-2004-x64
1NOTIFICACI...40.dll
windows7-x64
1NOTIFICACI...40.dll
windows10-2004-x64
1NOTIFICACI...40.dll
windows7-x64
1NOTIFICACI...40.dll
windows10-2004-x64
1NOTIFICACI..._1.dll
windows7-x64
1NOTIFICACI..._1.dll
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/000021 Notificacion Electronica.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/000021 Notificacion Electronica.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/Qt5Core.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/Qt5Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/Qt5Gui.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/Qt5Gui.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/Qt5Network.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/Qt5Network.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/Qt5PrintSupport.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/Qt5PrintSupport.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/Qt5Widgets.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/Qt5Widgets.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/msvcp140.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/msvcp140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/vcruntime140.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/vcruntime140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/vcruntime140_1.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/vcruntime140_1.dll
Resource
win10v2004-20241007-en
General
-
Target
NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21/000021 Notificacion Electronica.exe
-
Size
2.7MB
-
MD5
8915b9ccb4372a418729166dcedc5a44
-
SHA1
8f6ca11bcb5a53fe90007ec83b638b0c642d2a92
-
SHA256
6f7f390b2012e7dfef9fcbd673a4a0256e2e217b11831e9a27a9d460ba57c0d2
-
SHA512
fd7bd3a8d3a8331d4fdd331a41dc1b3efcdbb29062a8d316cf07edccc05e7eb81153f01ec95df68f9d1466ecee0be49684737f6cf895fe6e55ccf163f1058e66
-
SSDEEP
49152:YjVyoNKekkfTfR6RYC/9+xsO60ispMBHQ1rYHFRnb8omQsNh:zgi0iskHQ1MEN
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
=== 21 ===
19nov2024.duckdns.org:9003
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2380 set thread context of 3060 2380 000021 Notificacion Electronica.exe 31 PID 3060 set thread context of 2576 3060 cmd.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1204 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2380 000021 Notificacion Electronica.exe 2380 000021 Notificacion Electronica.exe 3060 cmd.exe 3060 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2380 000021 Notificacion Electronica.exe 3060 cmd.exe 3060 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2576 MSBuild.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3060 2380 000021 Notificacion Electronica.exe 31 PID 2380 wrote to memory of 3060 2380 000021 Notificacion Electronica.exe 31 PID 2380 wrote to memory of 3060 2380 000021 Notificacion Electronica.exe 31 PID 2380 wrote to memory of 3060 2380 000021 Notificacion Electronica.exe 31 PID 2380 wrote to memory of 3060 2380 000021 Notificacion Electronica.exe 31 PID 3060 wrote to memory of 2576 3060 cmd.exe 33 PID 3060 wrote to memory of 2576 3060 cmd.exe 33 PID 3060 wrote to memory of 2576 3060 cmd.exe 33 PID 3060 wrote to memory of 2576 3060 cmd.exe 33 PID 3060 wrote to memory of 2576 3060 cmd.exe 33 PID 3060 wrote to memory of 2576 3060 cmd.exe 33 PID 2576 wrote to memory of 2136 2576 MSBuild.exe 35 PID 2576 wrote to memory of 2136 2576 MSBuild.exe 35 PID 2576 wrote to memory of 2136 2576 MSBuild.exe 35 PID 2576 wrote to memory of 2136 2576 MSBuild.exe 35 PID 2136 wrote to memory of 1204 2136 cmd.exe 37 PID 2136 wrote to memory of 1204 2136 cmd.exe 37 PID 2136 wrote to memory of 1204 2136 cmd.exe 37 PID 2136 wrote to memory of 1204 2136 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21\000021 Notificacion Electronica.exe"C:\Users\Admin\AppData\Local\Temp\NOTIFICACIÓN ELECTRÓNICA ESM AGRADECEMOS CONFIRMAR RECIBIDO 21\000021 Notificacion Electronica.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp19EF.tmp.bat""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1204
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
777KB
MD55e973ec6bc0499e3b8500351a2ab2ce7
SHA1e0f0b56f9cc6f40bd5016841ac7091b79b374e5e
SHA2569334a375f913fa96e537abc58ab4efda15a70d937d9b012675dc32b40bfb8395
SHA512f0b998e930d6866b809ca58d4bedaf0bc8efebfd55b64b4cf896e3e1ba3268fa5e0d70ed0a8e90c37dce6a73c429d55ccd12a4d0fe3ead024ccf43b04ed494f6
-
Filesize
171B
MD54fe340c69bfb61e0cecf746ea2506339
SHA18d71119f3fb4a441b032ec60978f05e17b8a6232
SHA2562f052970db51064f06c1a523ec58e1bc5d553f45ccd3948240942496ae6a74b6
SHA512386d722b4ce339c8d81a90839ccd00b89e65e2a111021970860560e9759d773d845bde7defdd65ddf90f5fbe0b969658c89fae3d7e84d68fd6743628ece38ada