Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2025 15:57

General

  • Target

    01-ACTUACION JUDICIAL EN SU CONTRA.exe

  • Size

    121KB

  • MD5

    9c521a90653df5d1efbd0cea12318863

  • SHA1

    ec2afaf10b78dabfead9e9e485d454789c244188

  • SHA256

    85bcfc9de06bd0751245ad882f7e2141f340cdedefcaefb8deabbc0792088a58

  • SHA512

    d1bbb5e07e7df5fe6da9786ecee06c0dfd9e46067de48a139323aa045f81139b78404c4f3f77b1f6f58c3b11d1edf88d0c06ad42fcf7482436367f2444e6152e

  • SSDEEP

    1536:WMlHLXYAcNG6d2vlvPahT21HXNMMUpOh1lyDi8pgI7G/mJK:9raZ2AtmXmpXDiUgIK/MK

Score
1/10

Malware Config

Signatures

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01-ACTUACION JUDICIAL EN SU CONTRA.exe
    "C:\Users\Admin\AppData\Local\Temp\01-ACTUACION JUDICIAL EN SU CONTRA.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\System32\Wbem\wmic.exe
      wmic path win32_VideoController get name
      2⤵
      • Detects videocard installed
      • Suspicious use of AdjustPrivilegeToken
      PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2372-0-0x0000000002730000-0x0000000002D4F000-memory.dmp

    Filesize

    6.1MB

  • memory/2372-9-0x0000000068840000-0x0000000068F2C000-memory.dmp

    Filesize

    6.9MB

  • memory/2504-10-0x0000000068840000-0x0000000068F2C000-memory.dmp

    Filesize

    6.9MB