Analysis
-
max time kernel
80s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-10-2024 15:47
Static task
static1
Behavioral task
behavioral1
Sample
PTHAV002_2024-10-24_15_43_35.016.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PTHAV002_2024-10-24_15_43_35.016.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Device/HarddiskVolume4/Users/belia.peso.IBEROSTARHV.000/AppData/Local/Temp/Rar$EXa7092.35635/factura 563423.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Device/HarddiskVolume4/Users/belia.peso.IBEROSTARHV.000/AppData/Local/Temp/Rar$EXa7092.35635/factura 563423.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
PTHAV002_2024-10-24_15_43_35.016.zip
-
Size
787KB
-
MD5
5a2c6cfffcac05ee6c740c0f7565375e
-
SHA1
a097fa2843dd14bcfb671e65d2a6c1609cc583fd
-
SHA256
859571a129deed67ebc60c7e2e5d48b1e1282121e11d1d696e9cac88fa7c3643
-
SHA512
2a29df18728198eef81a8c568e81d47aad79826d38f15aad54be5c260a9528a2a86ebb4a3126a15a127efff5cbee21765abac51fd83a0b84889858ef1971f197
-
SSDEEP
24576:n/JgJcJ7c3Zd02xS3KNcFz3As/MFdL4qNj:nhgJc5cpd02x9cFzzYXNj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2896 factura 563423.exe 2420 factura 563423.exe 3008 factura 563423.exe -
Loads dropped DLL 6 IoCs
pid Process 2896 factura 563423.exe 2896 factura 563423.exe 2420 factura 563423.exe 2420 factura 563423.exe 3008 factura 563423.exe 3008 factura 563423.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 5 drive.google.com 6 drive.google.com 8 drive.google.com -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\oecus\svante.Eft factura 563423.exe File opened for modification C:\Windows\SysWOW64\oecus\svante.Eft factura 563423.exe File opened for modification C:\Windows\SysWOW64\oecus\svante.Eft factura 563423.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\resources\sankthansaftnerne\clodpoll.saf factura 563423.exe File opened for modification C:\Windows\resources\sankthansaftnerne\clodpoll.saf factura 563423.exe File opened for modification C:\Windows\resources\sankthansaftnerne\clodpoll.saf factura 563423.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language factura 563423.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language factura 563423.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language factura 563423.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016c4e-2.dat nsis_installer_1 behavioral1/files/0x0008000000016c4e-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2696 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2696 7zFM.exe Token: 35 2696 7zFM.exe Token: SeSecurityPrivilege 2696 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2696 7zFM.exe 2696 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\PTHAV002_2024-10-24_15_43_35.016.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2696
-
C:\Users\Admin\Desktop\factura 563423.exe"C:\Users\Admin\Desktop\factura 563423.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Users\Admin\Desktop\factura 563423.exe"C:\Users\Admin\Desktop\factura 563423.exe"2⤵PID:3192
-
-
C:\Users\Admin\Desktop\factura 563423.exe"C:\Users\Admin\Desktop\factura 563423.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Users\Admin\Desktop\factura 563423.exe"C:\Users\Admin\Desktop\factura 563423.exe"2⤵PID:3148
-
-
C:\Users\Admin\Desktop\factura 563423.exe"C:\Users\Admin\Desktop\factura 563423.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3008
-
C:\Users\Admin\Desktop\factura 563423.exe"C:\Users\Admin\Desktop\factura 563423.exe"1⤵PID:3136
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\factura 563423\" -spe -an -ai#7zMap12206:86:7zEvent204611⤵PID:3024
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\factura 563423\" -spe -an -ai#7zMap30890:86:7zEvent273281⤵PID:2888
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap2082:86:7zEvent7351⤵PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
901KB
MD56cb35cad38c80bbb552c99caf75f9371
SHA1f1dcc7d9805738aaf1f30b32383674ea30706269
SHA256057e7554f7a499adfd2c0a3485675fef4f602b23e2e0a1fd4e07da5b993e4ebf
SHA512638594b7228a8e747c34f1ab7916774feaff1ce58e875e64bb28cc6742472a305c5aa06e709ec708aad990d9e78ce828509af8a575b3fe62082699de1bb81734
-
Filesize
274B
MD54da37058224bd7b59229bb611e105f39
SHA11da82b8c8f86e54f744aff64c798e84d1c70e4eb
SHA2564f6eb70f672b677aaa6a534a1bfe8834e2608b72957d57df8089665816ddd90e
SHA512f839f7fbfedd517cf9a9c253ced6641f1d7cdb69694ba6ed939500ff99fe5247976c09ec915675d8691c04b80ba2f8e49068b4f916904bde994b4051abe3e98e
-
Filesize
200KB
MD584523a696370eab2f84cc398ffd50054
SHA19279a88692c419da715b74828f456ef4756ee7a0
SHA2568bf70ce6c463271b6bb4e259d1cbf5ae228751ccf95c5b69756cbeb9de60be95
SHA51240d04c68c156e120eef4463962d0dfb96e48a86709a3f162c4c1aa2c840f6058881ccda0d9006c35bbbe5bdde40eb27b1ddc0f71262cd682f37601992d9d853a
-
Filesize
241KB
MD579ad4943801e304b83e39774d00ed227
SHA1e3ed1c0c871e490194fad68584d401104e0d2bd6
SHA2561c0cc2363d16826b2c8d36d983e883e3d81e12df8456e3512bf80e7de28c9583
SHA512497dc447dd0bd52479445e7fce633427e17dcb02546e876b9ad6945a2c1186de20c26f7ea324ebb8608bf76b16846b738c8fba138004da07a7494e743e925481
-
Filesize
368KB
MD587a52f4e6ce72e090d982511c93e363e
SHA1c6a263c8afd9d2fc60fc7a07a8449f8a8cbd713d
SHA256838472456a1b5905bec73fe10a4afc9a09c01dfa3ff108deb1ceb57fac83718f
SHA5121d1f3973faebb73c0989d3fc991adad9f444ca36f7ea2c5fc0443769fde9e11c6eb1cbd2c6143c5da9167f2176c298d169a828b466826a6fde68e61961387b58
-
Filesize
218KB
MD527a799752643f5e96c57957dd115f836
SHA1c25dbe476573cbb94df8cb43cbbb7446e57b5bd4
SHA2566770149a0d8af75d3d8df950cf3d1a8475fc73e60ef9e3bd03ad04a2001035e7
SHA512fc46c8bd1186b0381e0f4679cb0844456dde98e62c47888c4eefdddc34c56274ab739c21c1dad4c75473a74a188698d9a268e07cd66c33464619ff6094ccf66f
-
Filesize
329KB
MD5e2701f9b21e2e3383c23d42a8a80f0cd
SHA1b48623eb7f31a6e559cb276cec52b8629f28688f
SHA2564cbc5303baa96a022304acac34ad9cbf9db661e89bf603ca872b0f38e2c7f3b7
SHA512c3d53de9228dbcc8498be846562a4630a35a321bab5344bd2ca4452b8c161405785a65ad2425b8764c0e95479f230fd8f78bf5501cad820deba8e5563621a122
-
Filesize
449KB
MD5a372469d5ea672a9c76fdcfe1127b8df
SHA125129be715c8a42ececfc70330e29a8bb7d21e14
SHA2563eb84177ebd5ca99880fee24652579f356008c29ff31e8e0f157693c3e16cc69
SHA51215179350720dec225250a113603e1b7d9f11d7556365dcf61f150d775ddfdb930fd08079f6d933c108d3748e63118b5d5d7017b2f29657af6ff07eb826d36d20
-
Filesize
320KB
MD5c6cca0bf9fb8cc569e1edbb70f5ab95e
SHA1fa9a3e70d31a5009f0d63d88ea8d224763936862
SHA256705a96fff4440f49a231e8d17b289d97786ec373aa5b39fdad48b410dca53ea8
SHA512efa09455d16f63322bd81986aeccc65aeab92a601aa11eb68725afcb3f61965510ffea65bb87a89a0123263189e6a4200958582f135b3c5bb0a023fddda35911
-
Filesize
475KB
MD5b0f8a54823350c2f31d2bb230615afb1
SHA16f46b1e8491247556108d37809870f0c34fb0f7f
SHA256f7161357b945d6764d2c290af7f7290c1c00a08aaaac622b45e2719ac6a50968
SHA512957b98b57883b2d56186a2ac17582453d092f8ef84ac360d16c3e3ee4bc28100537df84d0f30ae880298657404e45ba29761814a5e3cf16c90510cb8175a63a3
-
Filesize
860B
MD512661c6cccda04f3a4719c9b72a86abc
SHA10e8c6150b6c71e6e5422cc5547ad52745e8083e7
SHA256a1cc70e70b85a820f970a82ce1c58524e4c15052f6b1db4620e67374eb17ba2a
SHA512fe8b1771cefaf501d69e3cf1295e8174c13d8d9569684b2537aa373f89d2ea252f5c8215bc3d1aac9055938f7f45a3673ca0791f332c909eac9f605d01093a08
-
Filesize
830B
MD5a0b9574aca19808a588e1fd996cd2833
SHA10d6963cff9a899898a0015a37151a7a6390ea727
SHA256ccb9592997bf91936138f0c037a1bee30f2e9236869eadc17e23da3d86457390
SHA51285e90012578075e571ec0f04480d09368b5891bf6511ffa544c139a7e9aa7fb1e755807a2db72c962a79a9e910efb92c9906bb07061fb8b3da068a3661284d94
-
Filesize
860B
MD545ebd74a4d9e6c8c6353ac7763420a80
SHA1857492613707b3560a517c37312af9d972b5a99c
SHA2562db87e5584d782872e760ed647480763508ecf5e97aaa37c3060dbd6eb987123
SHA512f90b1ea000531b4aa9aa1212273c91fd73dfd7145ec59b7d16c184273d08207a89da33b1e7f5e09d1b38eafc103cad81a255ded5274095632b87cc3253ac443f
-
Filesize
11KB
MD5cf85183b87314359488b850f9e97a698
SHA16b6c790037eec7ebea4d05590359cb4473f19aea
SHA2563b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac
SHA512fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b