Overview
overview
5Static
static
52025032812...am.msg
windows7-x64
52025032812...am.msg
windows10-2004-x64
3Info Envia...ON.pdf
windows7-x64
3Info Envia...ON.pdf
windows10-2004-x64
310 Ingreso...te.pdf
windows7-x64
310 Ingreso...te.pdf
windows10-2004-x64
310 Ingreso...se.pdf
windows7-x64
310 Ingreso...se.pdf
windows10-2004-x64
310 Ingreso...um.pdf
windows7-x64
310 Ingreso...um.pdf
windows10-2004-x64
310 Ingreso...ti.pdf
windows7-x64
310 Ingreso...ti.pdf
windows10-2004-x64
310 Ingreso...ra.pdf
windows7-x64
310 Ingreso...ra.pdf
windows10-2004-x64
310 Ingreso...OE.pdf
windows7-x64
310 Ingreso...OE.pdf
windows10-2004-x64
310 Ingreso...ra.pdf
windows7-x64
310 Ingreso...ra.pdf
windows10-2004-x64
310 Ingreso...ol.pdf
windows7-x64
310 Ingreso...ol.pdf
windows10-2004-x64
3Info Envia...s.xlsx
windows7-x64
3Info Envia...s.xlsx
windows10-2004-x64
1Info Envia...ER.pdf
windows7-x64
3Info Envia...ER.pdf
windows10-2004-x64
3Info Envia...ER.pdf
windows7-x64
3Info Envia...ER.pdf
windows10-2004-x64
3Info Envia...AL.pdf
windows7-x64
3Info Envia...AL.pdf
windows10-2004-x64
3Info Envia...ed.pdf
windows7-x64
3Info Envia...ed.pdf
windows10-2004-x64
3Info Envia...10.pdf
windows7-x64
3Info Envia...10.pdf
windows10-2004-x64
3Analysis
-
max time kernel
137s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 12:32
Behavioral task
behavioral1
Sample
20250328122946-013_RADICAD_74123-bboadam.msg
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20250328122946-013_RADICAD_74123-bboadam.msg
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
Info Enviada DIAN Acta de Visita 08112023/1.AUTORIZACION.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Info Enviada DIAN Acta de Visita 08112023/1.AUTORIZACION.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
10 Ingresos y Retenciones/Hocol Retefuente.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
10 Ingresos y Retenciones/Hocol Retefuente.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
10 Ingresos y Retenciones/NKL - Certificado Cundiboyacense.pdf
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
10 Ingresos y Retenciones/NKL - Certificado Cundiboyacense.pdf
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
10 Ingresos y Retenciones/NKL - Certificado Petroleum.pdf
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
10 Ingresos y Retenciones/NKL - Certificado Petroleum.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
10 Ingresos y Retenciones/NKL - Certificado Vanti.pdf
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
10 Ingresos y Retenciones/NKL - Certificado Vanti.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
10 Ingresos y Retenciones/Trafigura.pdf
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
10 Ingresos y Retenciones/Trafigura.pdf
Resource
win10v2004-20250313-en
Behavioral task
behavioral15
Sample
10 Ingresos y Retenciones/UTOE.pdf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
10 Ingresos y Retenciones/UTOE.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
10 Ingresos y Retenciones/Vetra.pdf
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
10 Ingresos y Retenciones/Vetra.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
10 Ingresos y Retenciones/Vitol.pdf
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
10 Ingresos y Retenciones/Vitol.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
Info Enviada DIAN Acta de Visita 08112023/10. Ingresos y Retenciones.xlsx
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Info Enviada DIAN Acta de Visita 08112023/10. Ingresos y Retenciones.xlsx
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
Info Enviada DIAN Acta de Visita 08112023/11.1SOP INGR OPER.pdf
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Info Enviada DIAN Acta de Visita 08112023/11.1SOP INGR OPER.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
Info Enviada DIAN Acta de Visita 08112023/11.2SOP INGR OPER.pdf
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
Info Enviada DIAN Acta de Visita 08112023/11.2SOP INGR OPER.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
Info Enviada DIAN Acta de Visita 08112023/2.EXISTENCIA REPRESENTACIN LEGAL.pdf
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Info Enviada DIAN Acta de Visita 08112023/2.EXISTENCIA REPRESENTACIN LEGAL.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
Info Enviada DIAN Acta de Visita 08112023/3.Contrato EP Buenavista ANH - UTOE_compressed.pdf
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Info Enviada DIAN Acta de Visita 08112023/3.Contrato EP Buenavista ANH - UTOE_compressed.pdf
Resource
win10v2004-20250313-en
Behavioral task
behavioral31
Sample
Info Enviada DIAN Acta de Visita 08112023/3.Contrato UTOE - Otro SI No. 10.pdf
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Info Enviada DIAN Acta de Visita 08112023/3.Contrato UTOE - Otro SI No. 10.pdf
Resource
win10v2004-20250313-en
General
-
Target
20250328122946-013_RADICAD_74123-bboadam.msg
-
Size
18.1MB
-
MD5
d3b2438ea83b35fee618e8b8c535f2b8
-
SHA1
47f8c99020a84d2c8e16a09b34d57929d817a8f7
-
SHA256
4726db7fa32f6c204968dd2e4d289d4235254be54fd2150cf7569f91d0b57c01
-
SHA512
6ec9a5ed837b8395fdd73e1754fe42feb341904d0cd7caf297b7ccf5d5eb66dfa8633f84212ce314210248e40cccdfa474406af2b0a8445f3912c3eaede5c0ae
-
SSDEEP
393216:36btumBR+q0PRt4IM1MXB+cNVPdVO4zlprkbRU2X0wJpkWrdnXN9X0TGyGYzRSTr:qbtumH1PZ1M8cNVP/llprwrfkOaS+qO
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\PDFFile_8.ico OUTLOOK.EXE File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico OUTLOOK.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTLOOK.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\CompressedFolder\EditFlags = 00000000 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Charset OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Codepage OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CompressedFolder OUTLOOK.EXE -
NTFS ADS 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\DFSWKNHL\NKL - Acta Visita 8 Noviembre 2023 - Renta 2019.pdf:Zone.Identifier OUTLOOK.EXE File created C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\DFSWKNHL\NKL - Acta Visita 8 Noviembre 2023 - Renta 2019 (2).pdf\:Zone.Identifier:$DATA OUTLOOK.EXE File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\DFSWKNHL\Info Enviada DIAN Acta de Visita 08112023.zip:Zone.Identifier OUTLOOK.EXE File created C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\DFSWKNHL\Info Enviada DIAN Acta de Visita 08112023 (2).zip\:Zone.Identifier:$DATA OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1252 OUTLOOK.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1252 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1252 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1252 OUTLOOK.EXE 1116 AcroRd32.exe 1116 AcroRd32.exe 1116 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1116 1252 OUTLOOK.EXE 33 PID 1252 wrote to memory of 1116 1252 OUTLOOK.EXE 33 PID 1252 wrote to memory of 1116 1252 OUTLOOK.EXE 33 PID 1252 wrote to memory of 1116 1252 OUTLOOK.EXE 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\20250328122946-013_RADICAD_74123-bboadam.msg"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\DFSWKNHL\NKL - Acta Visita 8 Noviembre 2023 - Renta 2019.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\DFSWKNHL\Info Enviada DIAN Acta de Visita 08112023.zip
Filesize17.7MB
MD5f4e05f9c0e5b13136df737c21e633d9b
SHA147280caf864ca45703ae9d8bf9e1c84deb055ee0
SHA25667bd818c04d607763715aa3731f1e28b4af0e06ee93edbf07084299784bc3c6b
SHA512868d67c570f54292ab76ab421085e976b926ca004efaf8518289411789cdbd6e3edde13b7a4e47119c41a418a081b164a5076b4766ab721deebddeaed84d7a0b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\DFSWKNHL\NKL - Acta Visita 8 Noviembre 2023 - Renta 2019.pdf
Filesize132KB
MD572e141d862fe5590d34371d4369fb6fd
SHA12b98646c095c70763301813b45654adb58625d8f
SHA256e6a132c37a13f1f2c22e6144f40b1fdf1b7c9728027d21ad802a478e3f68bae6
SHA5125a77e14a4c6e09ac8625ecbfbc5c525b82f00e0bf34c13a19d70f137a5cd7af502f01887a353556558f1bb164839eabe0e49641357e77fc6fab112961f5feed1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\DFSWKNHL\NKL - Acta Visita 8 Noviembre 2023 - Renta 2019.pdf:Zone.Identifier
Filesize26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
3KB
MD56c50f0baa4e8509b7c6606ee6b37ec7b
SHA124af92177e2e250a8c697e358818c834c60510f1
SHA25670f078cc78a19a8f8b6229277f0b0ad0d03db9e420d1cc9dab32bf62e7f6bbb8
SHA512cfe1edaca83ea74b45510a3ffecb71acbcc39343d6eb25d8ae6a2b8cc65d2ec375ed422edd99c570138f79c72448e0ff8220c412927c645e2751cd8bd8393c5f
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84