Overview
overview
3Static
static
1Kobalt Too...ds.zip
windows7-x64
1Kobalt Too...ds.zip
windows10-2004-x64
1Area_Solic...es.cpg
windows7-x64
3Area_Solic...es.cpg
windows10-2004-x64
3Area_Solic...es.dbf
windows7-x64
3Area_Solic...es.dbf
windows10-2004-x64
Area_Solic...es.zip
windows7-x64
1Area_Solic...es.zip
windows10-2004-x64
12295AB1629...DD.xml
windows7-x64
32295AB1629...DD.xml
windows10-2004-x64
1doc.xml
windows7-x64
3doc.xml
windows10-2004-x64
1Area_Solic...es.prj
windows7-x64
3Area_Solic...es.prj
windows10-2004-x64
3Area_Solic...es.sbn
windows7-x64
3Area_Solic...es.sbn
windows10-2004-x64
3Area_Solic...es.sbx
windows7-x64
3Area_Solic...es.sbx
windows10-2004-x64
3Area_Solic...es.shp
windows7-x64
3Area_Solic...es.shp
windows10-2004-x64
3Area_Solic...hp.xml
windows7-x64
3Area_Solic...hp.xml
windows10-2004-x64
1Area_Solic...es.shx
windows7-x64
3Area_Solic...es.shx
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
Kobalt Tool Set Exclusive Rewards.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Kobalt Tool Set Exclusive Rewards.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Area_Solicitud_Imagen_Campo_Rubiales.cpg
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Area_Solicitud_Imagen_Campo_Rubiales.cpg
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Area_Solicitud_Imagen_Campo_Rubiales.dbf
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Area_Solicitud_Imagen_Campo_Rubiales.dbf
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Area_Solicitud_Imagen_Campo_Rubiales.zip
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Area_Solicitud_Imagen_Campo_Rubiales.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
2295AB1629D84436AB9A1F63441FD7DD.xml
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
2295AB1629D84436AB9A1F63441FD7DD.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
doc.xml
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
doc.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Area_Solicitud_Imagen_Campo_Rubiales.prj
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Area_Solicitud_Imagen_Campo_Rubiales.prj
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Area_Solicitud_Imagen_Campo_Rubiales.sbn
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Area_Solicitud_Imagen_Campo_Rubiales.sbn
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Area_Solicitud_Imagen_Campo_Rubiales.sbx
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Area_Solicitud_Imagen_Campo_Rubiales.sbx
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Area_Solicitud_Imagen_Campo_Rubiales.shp
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Area_Solicitud_Imagen_Campo_Rubiales.shp
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Area_Solicitud_Imagen_Campo_Rubiales.shp.xml
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Area_Solicitud_Imagen_Campo_Rubiales.shp.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Area_Solicitud_Imagen_Campo_Rubiales.shx
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Area_Solicitud_Imagen_Campo_Rubiales.shx
Resource
win10v2004-20240802-en
General
-
Target
Area_Solicitud_Imagen_Campo_Rubiales.sbn
-
Size
132B
-
MD5
e90859d19d05c6670ce063770c6a7f2d
-
SHA1
13297db148f1a2e91118f1b8d83cb8df54100ffa
-
SHA256
29638b66a1d91f0311723dbbf2ccd6fa817dcdc586467c1cd206d68d5e88c6be
-
SHA512
807e3914f03d88d3888454a7187e3fb1f9e5a15066786d25451e23fe126be4d3d91d1be77c6f70fbadfde82693e1ec1c052cc1c6b578eeaadf340b673878ee71
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\sbn_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.sbn rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.sbn\ = "sbn_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\sbn_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\sbn_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\sbn_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\sbn_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\sbn_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2764 AcroRd32.exe 2764 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2792 1440 cmd.exe 32 PID 1440 wrote to memory of 2792 1440 cmd.exe 32 PID 1440 wrote to memory of 2792 1440 cmd.exe 32 PID 2792 wrote to memory of 2764 2792 rundll32.exe 33 PID 2792 wrote to memory of 2764 2792 rundll32.exe 33 PID 2792 wrote to memory of 2764 2792 rundll32.exe 33 PID 2792 wrote to memory of 2764 2792 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Area_Solicitud_Imagen_Campo_Rubiales.sbn1⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Area_Solicitud_Imagen_Campo_Rubiales.sbn2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Area_Solicitud_Imagen_Campo_Rubiales.sbn"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bf8b2fc6d0a5ba4a271f2e252de80ffe
SHA125007007bc7c2301db444383551a69cc3e398c76
SHA256d3aa39a9ee3c8badde5e03d0f299a3cc8a84837d6f3afee90322ff80fa7fa008
SHA512cfa6a06fd41fb5d21f5607424be41871ce12a16db63f26b3f78d37da3ec2286333281b27464473116c36dfb4e51d87f55aaec622cfdd1e02c782dc8c49082394