Overview
overview
10Static
static
5111.exe
windows7-x64
10111.exe
windows10-2004-x64
10Word/HookDrv.dll
windows7-x64
3Word/HookDrv.dll
windows10-2004-x64
3Word/RManF...nt.exe
windows7-x64
3Word/RManF...nt.exe
windows10-2004-x64
3Word/RManServer.exe
windows7-x64
10Word/RManServer.exe
windows10-2004-x64
10blat.dll
windows7-x64
3blat.dll
windows10-2004-x64
3blat.exe
windows7-x64
3blat.exe
windows10-2004-x64
3Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 13:47
Behavioral task
behavioral1
Sample
111.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
111.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Word/HookDrv.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Word/HookDrv.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Word/RManFUSClient.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Word/RManFUSClient.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Word/RManServer.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Word/RManServer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
blat.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
blat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
blat.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
blat.exe
Resource
win10v2004-20241007-en
General
-
Target
Word/RManFUSClient.exe
-
Size
2.5MB
-
MD5
eab8cb5fef7a716886ae19877c80d52e
-
SHA1
6cef2260d2fb047c69ab2afa1a9f5d8c75715f4b
-
SHA256
8f167e5ba3536b6bb20de8168709a469c9d440e6ce9ad80915479a20e8bd53fb
-
SHA512
e4b2734c8b811ac1035e24d8a336e58726b3ffe984aa13fbcfe703716f8ccf1ca798a08850951934e7d98c14ec201a4abf12a7248789f744423ca7860ddb2d3e
-
SSDEEP
49152:mOjOHAqSdSQfZZck2c6pgcqYOHNTBLupHc+w:upOT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RManFUSClient.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 932 RManFUSClient.exe 932 RManFUSClient.exe