Analysis
-
max time kernel
95s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
00254-ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA JUZGADO PENAL CIRCUITO RAMA JUDICIAL/0-NOTIFICO DEMANDA.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
00254-ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA JUZGADO PENAL CIRCUITO RAMA JUDICIAL/0-NOTIFICO DEMANDA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
00254-ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA JUZGADO PENAL CIRCUITO RAMA JUDICIAL/CI.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
00254-ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA JUZGADO PENAL CIRCUITO RAMA JUDICIAL/CI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
00254-ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA JUZGADO PENAL CIRCUITO RAMA JUDICIAL/info.htm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
00254-ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA JUZGADO PENAL CIRCUITO RAMA JUDICIAL/info.htm
Resource
win10v2004-20241007-en
General
-
Target
00254-ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA JUZGADO PENAL CIRCUITO RAMA JUDICIAL/0-NOTIFICO DEMANDA.exe
-
Size
4.6MB
-
MD5
ae2a273bd3297d0abe74f940f76575a8
-
SHA1
73a8eaff4cb01bc03826bc90e7bd5f658bf2f5ac
-
SHA256
1fd92aa46464f8453e33dc7461f80ee7b441f9042e9d0110086226c5f725bd9f
-
SHA512
233e8d400138a72a2c64dcfcc0212e771c51d49a499e6a607b2b5a6ff4582fef05ebf551380193a5d00f9179e2b431ddc25a7e556a2857704008a4f5d3a2455a
-
SSDEEP
98304:nXTE4R/w8VGgIW7ZLl3F2xXFHOBe1gORB9O:nXTE4RnQWBl3MgOE
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
perroshp.duckdns.org:3030
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
0-NOTIFICO DEMANDA.execmd.exedescription pid Process procid_target PID 3436 set thread context of 1764 3436 0-NOTIFICO DEMANDA.exe 82 PID 1764 set thread context of 936 1764 cmd.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MSBuild.exe0-NOTIFICO DEMANDA.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0-NOTIFICO DEMANDA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
0-NOTIFICO DEMANDA.execmd.exepid Process 3436 0-NOTIFICO DEMANDA.exe 3436 0-NOTIFICO DEMANDA.exe 1764 cmd.exe 1764 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
0-NOTIFICO DEMANDA.execmd.exepid Process 3436 0-NOTIFICO DEMANDA.exe 1764 cmd.exe 1764 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid Process Token: SeDebugPrivilege 936 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0-NOTIFICO DEMANDA.execmd.exedescription pid Process procid_target PID 3436 wrote to memory of 1764 3436 0-NOTIFICO DEMANDA.exe 82 PID 3436 wrote to memory of 1764 3436 0-NOTIFICO DEMANDA.exe 82 PID 3436 wrote to memory of 1764 3436 0-NOTIFICO DEMANDA.exe 82 PID 3436 wrote to memory of 1764 3436 0-NOTIFICO DEMANDA.exe 82 PID 1764 wrote to memory of 936 1764 cmd.exe 92 PID 1764 wrote to memory of 936 1764 cmd.exe 92 PID 1764 wrote to memory of 936 1764 cmd.exe 92 PID 1764 wrote to memory of 936 1764 cmd.exe 92 PID 1764 wrote to memory of 936 1764 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\00254-ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA JUZGADO PENAL CIRCUITO RAMA JUDICIAL\0-NOTIFICO DEMANDA.exe"C:\Users\Admin\AppData\Local\Temp\00254-ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA JUZGADO PENAL CIRCUITO RAMA JUDICIAL\0-NOTIFICO DEMANDA.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
777KB
MD56bf3cfe5eb01f94c097e6a2bfbaaad55
SHA14999e0e2a3c3c98ec52f6f5788d81946c885226b
SHA2565ee0a5ed8b929bb97aaa22ff985f506ba4216b5ccd2bd9b37ae35c9b542938d2
SHA51209d3b6170045af66e6f3b208d4771227545a1978db160ca258bb2bde0826c31c93f2123ca28bff1ce6075ae5b1ee27c5e1ac21966687df462d254bc026cf0db4