Overview
overview
10Static
static
3URGENTE Of...ue.tar
windows7-x64
7URGENTE Of...ue.tar
windows10-2004-x64
10URGENTE Of...ca.exe
windows7-x64
1URGENTE Of...ca.exe
windows10-2004-x64
10URGENTE Of...ng.dll
windows7-x64
1URGENTE Of...ng.dll
windows10-2004-x64
1URGENTE Of...ry.dll
windows7-x64
1URGENTE Of...ry.dll
windows10-2004-x64
1URGENTE Of...nu.dll
windows7-x64
1URGENTE Of...nu.dll
windows10-2004-x64
1URGENTE Of...0u.dll
windows7-x64
1URGENTE Of...0u.dll
windows10-2004-x64
1URGENTE Of...00.dll
windows7-x64
1URGENTE Of...00.dll
windows10-2004-x64
1URGENTE Of...00.dll
windows7-x64
1URGENTE Of...00.dll
windows10-2004-x64
1URGENTE Of...e3.dll
windows7-x64
1URGENTE Of...e3.dll
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562.tar.uue.tar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562.tar.uue.tar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/00012 NotificacionElectronica.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/00012 NotificacionElectronica.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/GSLogging.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/GSLogging.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/MigrationLibrary.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/MigrationLibrary.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/mfc100enu.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/mfc100enu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/mfc100u.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/mfc100u.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/msvcp100.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/msvcp100.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/msvcr100.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/msvcr100.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/sqlite3.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562/sqlite3.dll
Resource
win10v2004-20241007-en
General
-
Target
URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562.tar.uue.tar
-
Size
8.6MB
-
MD5
dd9d133f09ddd0a864b843313af08cab
-
SHA1
b09affaba79f8ddd94863340d7d43b3fae850bbb
-
SHA256
fdebbf313b6c8bf7a2db3ef7a19425c32ce87c5874b5d62ea65e4c0dacfa175a
-
SHA512
9729fb43c0bea49b84c90bee8cd227489f07916488d406a0bf71ebaccea488a1b86247da95aec9dff5faade155c0a79d51e510da7d2430cc6fc54c708ece604e
-
SSDEEP
98304:QzFcHtyue0g27TTwiMfeEA5KFLOAkGkzdnEVomFHKnPAHxkPsqfL:0Ity50g2H8kEHFLOyomFHKnPAHxkPd
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
12 noviembre
12novwins.duckdns.org:9003
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Executes dropped EXE 1 IoCs
pid Process 4676 00012 NotificacionElectronica.exe -
Loads dropped DLL 6 IoCs
pid Process 4676 00012 NotificacionElectronica.exe 4676 00012 NotificacionElectronica.exe 4676 00012 NotificacionElectronica.exe 4676 00012 NotificacionElectronica.exe 4676 00012 NotificacionElectronica.exe 4676 00012 NotificacionElectronica.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4676 set thread context of 1568 4676 00012 NotificacionElectronica.exe 106 PID 1568 set thread context of 3212 1568 cmd.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4676 00012 NotificacionElectronica.exe 4676 00012 NotificacionElectronica.exe 1568 cmd.exe 1568 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3548 7zFM.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4676 00012 NotificacionElectronica.exe 1568 cmd.exe 1568 cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3548 7zFM.exe Token: 35 3548 7zFM.exe Token: SeSecurityPrivilege 3548 7zFM.exe Token: SeDebugPrivilege 3212 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3548 7zFM.exe 3548 7zFM.exe 3548 7zFM.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4676 wrote to memory of 1568 4676 00012 NotificacionElectronica.exe 106 PID 4676 wrote to memory of 1568 4676 00012 NotificacionElectronica.exe 106 PID 4676 wrote to memory of 1568 4676 00012 NotificacionElectronica.exe 106 PID 4676 wrote to memory of 1568 4676 00012 NotificacionElectronica.exe 106 PID 1568 wrote to memory of 3212 1568 cmd.exe 112 PID 1568 wrote to memory of 3212 1568 cmd.exe 112 PID 1568 wrote to memory of 3212 1568 cmd.exe 112 PID 1568 wrote to memory of 3212 1568 cmd.exe 112 PID 1568 wrote to memory of 3212 1568 cmd.exe 112
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562.tar.uue.tar"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3548
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1548
-
C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\00012 NotificacionElectronica.exe"C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\00012 NotificacionElectronica.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
777KB
MD5782164b365b1f29177846887c2433ad9
SHA1f95d68a231d4265afb03eae4783bee559e71f911
SHA256873b61a8ab9387ab642c0a75a48b4554ce8198d81b94636c9304324b655a77f4
SHA5128c50323926233f02fea0894dd735f71f63a39425510bc08faa1f8cd1dc57a0716fe614bd3f384c00f5de2b92bbfa8d083cff8faed8d9ffa791f97f04dc8f0afd
-
C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\00012 NotificacionElectronica.exe
Filesize455KB
MD5c544a0e2e173c94fa9069c73e7af6367
SHA11b8040c145d6cb2af6d1d9c1dc6878d51820e53b
SHA2569d8547266c90cae7e2f5f5a81af27fb6bc6ade56a798b429cdb6588a89cec874
SHA512f47694025fad1c67b727c9836d3663fa0f251a46e855e78e4c323beac1d82d13632e10d16e06e0d81718953ed6e06ee5e918195268ba988f3e555b432f1784a7
-
C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\GSLogging.dll
Filesize44KB
MD5a3b858a04592d13335a9e43804f0527a
SHA18f0386a0a240676b7cfdfcb2f70888a2033fc84a
SHA2567d42e121560bc79a2375a15168ac536872399bf80de08e5cc8b3f0240cdc693a
SHA51226baad23d4ec8c4911bf801bdcb2aa541116da60df8c9aa1c8e31bc0979c87c84e0e3a843544d6be185dded2073cfdb223ccf9a7f3c0725cd37427d39f747848
-
C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\MSVCP100.dll
Filesize593KB
MD5d029339c0f59cf662094eddf8c42b2b5
SHA1a0b6de44255ce7bfade9a5b559dd04f2972bfdc8
SHA256934d882efd3c0f3f1efbc238ef87708f3879f5bb456d30af62f3368d58b6aa4c
SHA512021d9af52e68cb7a3b0042d9ed6c9418552ee16df966f9ccedd458567c47d70471cb8851a69d3982d64571369664faeeae3be90e2e88a909005b9cdb73679c82
-
C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\MigrationLibrary.dll
Filesize107KB
MD586d02c85056a2f0540babc63212bb1b6
SHA10b622c4943c8cc31cbcdbfec5324d4d7495cc94f
SHA256ea748caf0ed2aac4008ccb9fd9761993f9583e3bc35783cfa42593e6ba3eb393
SHA512359476a5d66e97ed21b1f0b2ea80ed6e791ab531a215b1eba8e32ca97258c471a7b74ecfc86f964f31d07e6b8cbfe16dd0b5bacce282ed801a1c59bb605e0367
-
C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\hqg
Filesize535KB
MD58be1eed996c72faff144110d8b39fd25
SHA1cddbb8864a030b8db985f589fa0eaf8417750dbd
SHA256cfc5e02bb0c9723ade1e0eab4f267802879afb6f356e4f73137ad70864d9029d
SHA5121f1036db916fb8a838e76e8d6d7c9d6c46f6a70cdc6dcd1fbc01b873d2a450f54bfadd5d5a978e3aeff8615b76c857d6493a785415c7a18b10652c5aba14d114
-
C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\mfc100enu.dll
Filesize53KB
MD55e2f28a979a0ce9b43f1815a593617c5
SHA1a2414a20ffcfd558a9ef5c10bfd6be96c91d87eb
SHA256ce0905a140d0f72775ea5895c01910e4a492f39c2e35edce9e9b8886a9821fb1
SHA5124687af53512eb29ad72c213cbcd27bfd5454c3791a727a8f35808f5fc74c54f2bdfe3267e708433041ed2acd65a8fe59a791a83f497dfc0131c45ee1c7693390
-
C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\mfc100u.dll
Filesize5.3MB
MD585ed13922df97474af9979ca456c6748
SHA1d79cdd200b6543e06d18ed67e44c7bba50de7d85
SHA2564c33d4179fff5d7aa7e046e878cd80c0146b0b134ae0092ce7547607abc76a49
SHA512dcf9bb66a621d49d036f418337c2c454c3a3212c3d008c2dfe764b374ffaed1ce7ea3c6fb30f0c30a64ae3b901146fe474427e9bf4931e01e1a5cb5dcf2b5033
-
C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\msvcr100.dll
Filesize809KB
MD5366fd6f3a451351b5df2d7c4ecf4c73a
SHA150db750522b9630757f91b53df377fd4ed4e2d66
SHA256ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5
SHA5122de764772b68a85204b7435c87e9409d753c2196cf5b2f46e7796c99a33943e167f62a92e8753eaa184cd81fb14361e83228eb1b474e0c3349ed387ec93e6130
-
C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\ogyui
Filesize26KB
MD58d5b7d9283a48f2b83081da8265c6253
SHA1f8649706c6c958666fae1e63322afe26ecd9e05d
SHA2565a1f8f488e151b589c8e9cb5740b060f3f33b4897ef483782cc125d13f51d436
SHA5127dd98450d672578a6e176c4548220713a27ee95ebebf0842a287e523debc1fca0a0c42685076cae041ccc12dd0e1a8c1ac5ef9c4748eba8b890fc804102412a6
-
C:\Users\Admin\Desktop\URGENTE Oficio 391 NOTIFICACIÓN ELECTRÓNICA CENDO RAMA RADICADO 153153135 000 6562\sqlite3.dll
Filesize723KB
MD5c66a7d728dda63a285388f4bd7fd35dc
SHA1859f3e4c140a76a12ff7fda9b384480cc4479b7e
SHA256eda647ca391f1a46070e6ff493d6e1b6a28320ed6758f9b08bd3474519f1544c
SHA512e58c5ca8a3275c9d5ba59f04a8c6aabdac6c8adeca162588166da52e90f7cabf5616a0ca8cb2430a6885d36e4cbb16a5d6bb8c5979d86444686f09045d958765