Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe
Resource
win7-20241010-en
General
-
Target
4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe
-
Size
3.2MB
-
MD5
0ac08d19b395d553f50168235f7c7ed0
-
SHA1
1a9b02b39fe52066db32e233b541f2b0db68cb23
-
SHA256
4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7
-
SHA512
9a65bad63e1da4a8d6c2567eb71733b318cb68f0eebbe6a1ef3eb0cbbea50b63a1649a80d6e5253de17964a3e3a7150dca5faef01c171bd95aacb5f4a26b7d9a
-
SSDEEP
98304:R57Up17aZGruoEinbe6xKpCxlronCUsvm:DweWuoDDKgxpoU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 HIS.exe -
Loads dropped DLL 3 IoCs
pid Process 2224 4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe 2840 HIS.exe 2788 AcroRd32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HIS Start = "C:\\ProgramData\\CDDLSI\\HIS.exe" HIS.exe -
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral1/files/0x0006000000019242-20.dat pdf_with_link_action -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HIS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2840 HIS.exe 2840 HIS.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2840 HIS.exe 2788 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2840 HIS.exe 2840 HIS.exe 2840 HIS.exe 2840 HIS.exe 2788 AcroRd32.exe 2788 AcroRd32.exe 2788 AcroRd32.exe 2788 AcroRd32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2840 2224 4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe 31 PID 2224 wrote to memory of 2840 2224 4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe 31 PID 2224 wrote to memory of 2840 2224 4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe 31 PID 2224 wrote to memory of 2840 2224 4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe 31 PID 2224 wrote to memory of 2788 2224 4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe 32 PID 2224 wrote to memory of 2788 2224 4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe 32 PID 2224 wrote to memory of 2788 2224 4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe 32 PID 2224 wrote to memory of 2788 2224 4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe"C:\Users\Admin\AppData\Local\Temp\4aa09fa0529beb0d2096a1aa86cf4111cfff56b479a4048e8dcd13b937c7c0c7N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\ProgramData\CDDLSI\HIS.exe"C:\ProgramData\CDDLSI\HIS.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MasturbacaoFeminina.pdf"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD526d6bf276f84648747ea5b23fc8428bb
SHA1c5ce10312cfa9ec2996fdd9fdd0f9e7bd78a29fd
SHA25640f3ea70192c256d0f26467dae63edbc48b64feff0e08272ebd9cdf1bded9262
SHA512e4850c2e11fd7ec838068f7d3938532898128b3dd840ac74752c94d68ae5dff99f221396211ba5a465750e6538e158293b7080da3c6951c214ecbeea534961e2
-
Filesize
80KB
MD50be24f7df280c4989c2e0095fa5295f1
SHA195a0e64f5e161835ccfe5e3b46416fc4e83b9e8b
SHA256693644e3efa419806932a680601b8f037b314b0b957d3716838174a7958c49b6
SHA5121f34a626ae87dbf0604523a6058e116a0eb743e00a58e5be8d69375c1567f61029f91f4bba4b5293b0abfc7300862deb13fa047108648c8a3fd812802fe49c88
-
Filesize
793KB
MD5026aa9f78e651c1f26626c5ea7038f10
SHA17cae80b0f4d8fd3e8acbb1d7e849d0b3c71bbeee
SHA256ddd2528e349289ed7c3aedd73d1f79fcc5b7cf5e54eda793cb7b0c726c98f9d3
SHA512bde39e87ed23bf4fb2d2a138a2e6bce3d8303323444fbf5aa3491a2604a29fb99f08b54b3122cc4d983480010b7e3945254d4ed2a6d3bacdb25083238b6145fd
-
Filesize
3KB
MD54d3907bb119520bf42ccbf793b42c141
SHA1deafd01040e93574fd42be41479252d28fac43d9
SHA25626da52658ccd9c2b13e87a36a749327b0022cfe2ba98007b320266ff4b3a3fa4
SHA5126419531347e8995871194eab9db7b237417953c06290bcf96ecce53206631219b375120363b77d207e6b106de32ea6f15331f932585a7458d771b67b15dcad70
-
Filesize
2.3MB
MD584bd1dd4eabec5fe9b2911c461c5a883
SHA1d9ca77eaba19d6f2656e0f3ac79ad1924eb7aea4
SHA256479a4e8f6f4dfe58308e6816bf5de0f16bc47734d61a7bd0b8b68809f14db60b
SHA512fac4f43f371ed34bb26b1e89054162febeee61052b1eb7e8ce9cfb7a8edc200c8a76a0948a0bea74354aa723446d76a494a908189eaef03430bc3a3ae0edbd2f