Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-es -
resource tags
arch:x64arch:x86image:win7-20241010-eslocale:es-esos:windows7-x64systemwindows -
submitted
06-12-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
Documento_Legal.N°39273822-1289.rar
Resource
win7-20241010-es
Behavioral task
behavioral2
Sample
Documento_Legal.N°39273822-1289.rar
Resource
win10v2004-20241007-es
Behavioral task
behavioral3
Sample
Documento_Legal.N°39273822-1289.exe
Resource
win7-20241010-es
Behavioral task
behavioral4
Sample
Documento_Legal.N°39273822-1289.exe
Resource
win10v2004-20241007-es
General
-
Target
Documento_Legal.N°39273822-1289.rar
-
Size
583KB
-
MD5
e5301d99eb87f0ec6efeb33ca44011f7
-
SHA1
5e918641f0a8b5d582bb00e31078cebf1deda4db
-
SHA256
9f234869febc12d41ea9e4520617b01ee96ee00044a285e23c5144568bdf82a5
-
SHA512
7042365faa9b513e4f8283be7aaa3be198eab7b10f8ad143b886dd069d9bf9170ea60ad70e14287c3d62e90dac15ac96df2658a95beb24f0dc4c816b7968a3f8
-
SSDEEP
12288:Vkav7xcnBkCLQYGAA/ITF6PMdBC4qJc+QAMt6FU5n+8Lng7TA2ZBXIuFxA:Vp7xcnBkcpxTYPGIFm+Qtqs+8LnOHBrW
Malware Config
Extracted
asyncrat
1.0.7
Dicembrinos05
Mystudio201.casacam.net:8854
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Executes dropped EXE 1 IoCs
pid Process 2792 Documento_Legal.N°39273822-1289.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\ReduceMemory = "C:\\Users\\Admin\\Documents\\ReduceMemory\\Bin\\ReduceMemory.exe" Documento_Legal.N°39273822-1289.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2792 set thread context of 2756 2792 Documento_Legal.N°39273822-1289.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Documento_Legal.N°39273822-1289.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2564 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2564 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2564 7zFM.exe Token: 35 2564 7zFM.exe Token: SeSecurityPrivilege 2564 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2564 7zFM.exe 2564 7zFM.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2792 2564 7zFM.exe 31 PID 2564 wrote to memory of 2792 2564 7zFM.exe 31 PID 2564 wrote to memory of 2792 2564 7zFM.exe 31 PID 2564 wrote to memory of 2792 2564 7zFM.exe 31 PID 2792 wrote to memory of 2756 2792 Documento_Legal.N°39273822-1289.exe 32 PID 2792 wrote to memory of 2756 2792 Documento_Legal.N°39273822-1289.exe 32 PID 2792 wrote to memory of 2756 2792 Documento_Legal.N°39273822-1289.exe 32 PID 2792 wrote to memory of 2756 2792 Documento_Legal.N°39273822-1289.exe 32 PID 2792 wrote to memory of 2756 2792 Documento_Legal.N°39273822-1289.exe 32 PID 2792 wrote to memory of 2756 2792 Documento_Legal.N°39273822-1289.exe 32
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Documento_Legal.N°39273822-1289.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\7zO40AC6717\Documento_Legal.N°39273822-1289.exe"C:\Users\Admin\AppData\Local\Temp\7zO40AC6717\Documento_Legal.N°39273822-1289.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD570c65845de82550d68a1d51e014d14e7
SHA1c8dcffc148c080554e084b065ebe96a3e761b228
SHA2568832b1c7296d3b9779f18c420660f81ca9c4ea3a24f2cd7f11e3522c385fc302
SHA512b5331b0b76b4a9d5462994cc2f62dd1b0a4e8f7f52998cef40bdbfd1292f44ffc7148ad5a4cf8b9f91a812373721223cf10c74c5c7242b066daccd6ada96f364