Overview
overview
10Static
static
3FACTURA_240001920.zip
windows7-x64
7FACTURA_240001920.zip
windows10-2004-x64
1document.exe
windows7-x64
3document.exe
windows10-2004-x64
10Acclimate.dec
windows7-x64
3Acclimate.dec
windows10-2004-x64
3Ergometere...ks.txt
windows7-x64
1Ergometere...ks.txt
windows10-2004-x64
1Myomectomy.und
windows7-x64
3Myomectomy.und
windows10-2004-x64
3Unlearnabi...ng.tyr
windows7-x64
3Unlearnabi...ng.tyr
windows10-2004-x64
3Unlearnabi...ae.for
windows7-x64
3Unlearnabi...ae.for
windows10-2004-x64
3bayrernes.afv
windows7-x64
3bayrernes.afv
windows10-2004-x64
3Analysis
-
max time kernel
52s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 10:09
Static task
static1
Behavioral task
behavioral1
Sample
FACTURA_240001920.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
FACTURA_240001920.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
document.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
document.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Acclimate.dec
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Acclimate.dec
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ergometerets/marks.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Ergometerets/marks.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Myomectomy.und
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
Myomectomy.und
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Unlearnability/quadding.tyr
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Unlearnability/quadding.tyr
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Unlearnability/termitidae.for
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Unlearnability/termitidae.for
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
bayrernes.afv
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
bayrernes.afv
Resource
win10v2004-20241007-en
General
-
Target
Unlearnability/termitidae.for
-
Size
78KB
-
MD5
a16b4c5b79e878c5721c8a6c5a268534
-
SHA1
6dd40143064ac09f0b1a56f2506cadc99cb8408b
-
SHA256
cf500a247199a2a63e13af82aa1ad2a480474d7657be235920fa0bb49525e73b
-
SHA512
5f4a4b0c46613d19105151876e3dd43fbc2d15bdb5777f51c0ff2dc2b96130e0182088cfe2eaecb0e0eb4431a5e9f3167370f92ce51ce9cb9ad172282b2c21e7
-
SSDEEP
768:muoKeVhQXbD23MaW0pIw72HSQAwG5ih+b:ZeAuq+b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2204 AcroRd32.exe 2204 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2232 1656 cmd.exe 29 PID 1656 wrote to memory of 2232 1656 cmd.exe 29 PID 1656 wrote to memory of 2232 1656 cmd.exe 29 PID 2232 wrote to memory of 2204 2232 rundll32.exe 30 PID 2232 wrote to memory of 2204 2232 rundll32.exe 30 PID 2232 wrote to memory of 2204 2232 rundll32.exe 30 PID 2232 wrote to memory of 2204 2232 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Unlearnability\termitidae.for1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Unlearnability\termitidae.for2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Unlearnability\termitidae.for"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2204
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5eebde25950fd19b98060e3f6aa74af2d
SHA12b82753eaa6aa6ce415aac8c85cc6a51ec3eb445
SHA25689016e8d8be385538ed4ff68f41c801ec4d43e4437223691cc88c41633a400a3
SHA512d99d464fbfaf4116a436e06cf7c72411123ceda601802f57c4df9703500e803b0a933c5a911c8d1c2f87bfbc8a66c3bb19fd94f808b8ae36dc5648af331a7606