Overview
overview
8Static
static
1ML057049.lzh
windows7-x64
1ML057049.lzh
windows10-2004-x64
3Okthabah.exe
windows7-x64
8Okthabah.exe
windows10-2004-x64
8Modsige.til247
windows7-x64
3Modsige.til247
windows10-2004-x64
3Onerosity240.ops
windows7-x64
3Onerosity240.ops
windows10-2004-x64
3Perseverat...us.gas
windows7-x64
3Perseverat...us.gas
windows10-2004-x64
3Perseverat...en.msk
windows7-x64
3Perseverat...en.msk
windows10-2004-x64
3Perseverat...nk.txt
windows7-x64
1Perseverat...nk.txt
windows10-2004-x64
1Perseverat...ip.jge
windows7-x64
3Perseverat...ip.jge
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
ML057049.lzh
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ML057049.lzh
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Okthabah.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Okthabah.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Modsige.til247
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Modsige.til247
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Onerosity240.ops
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
Onerosity240.ops
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Perseverate/Monosiphonous.gas
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Perseverate/Monosiphonous.gas
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
Perseverate/Sidetallerken.msk
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Perseverate/Sidetallerken.msk
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Perseverate/riverbank.txt
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
Perseverate/riverbank.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Perseverate/seigniorship.jge
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
Perseverate/seigniorship.jge
Resource
win10v2004-20240508-en
General
-
Target
Perseverate/Sidetallerken.msk
-
Size
2KB
-
MD5
fe015ab4c7b1a4b45cb5482a5129e455
-
SHA1
bdab53a97ae82149b83b5c3fb663b924a6731b16
-
SHA256
88c2496adf0fe02a1d2feb422956a16d4ac6cb7304bf9e169996bf9fdc0c0c7d
-
SHA512
2bc395ff0e915dcda1e901716f7b06dd8b93fb08989c6ac8d860aadd77d026039c193016748e82a8e0b8e3c68447a1b30b4f962792ca57d5c52b8fd14fe66460
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.msk rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\msk_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\msk_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\msk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\msk_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.msk\ = "msk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\msk_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\msk_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2768 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2768 AcroRd32.exe 2768 AcroRd32.exe 2768 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1740 wrote to memory of 3000 1740 cmd.exe 29 PID 1740 wrote to memory of 3000 1740 cmd.exe 29 PID 1740 wrote to memory of 3000 1740 cmd.exe 29 PID 3000 wrote to memory of 2768 3000 rundll32.exe 30 PID 3000 wrote to memory of 2768 3000 rundll32.exe 30 PID 3000 wrote to memory of 2768 3000 rundll32.exe 30 PID 3000 wrote to memory of 2768 3000 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Perseverate\Sidetallerken.msk1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Perseverate\Sidetallerken.msk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Perseverate\Sidetallerken.msk"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ddf0be39baac7c69d727fbd1edad5122
SHA1a76ef61175a6b2d9c256a47a01fbc92471634711
SHA256802304cd475ea21146a29df185e74d5232998b27d1d1d83337df97762361f339
SHA5122c7993c17af02ec98b0c344315a4c57fe58af1bd5da1072a58b2dd80271190f1ae92522c9f337f5ef706b6f649d69cb4e0c7fe3db5cdf700db70b284c6c95a3a