Overview
overview
10Static
static
3FACTURA_240001920.zip
windows7-x64
7FACTURA_240001920.zip
windows10-2004-x64
1document.exe
windows7-x64
3document.exe
windows10-2004-x64
10Acclimate.dec
windows7-x64
3Acclimate.dec
windows10-2004-x64
3Ergometere...ks.txt
windows7-x64
1Ergometere...ks.txt
windows10-2004-x64
1Myomectomy.und
windows7-x64
3Myomectomy.und
windows10-2004-x64
3Unlearnabi...ng.tyr
windows7-x64
3Unlearnabi...ng.tyr
windows10-2004-x64
3Unlearnabi...ae.for
windows7-x64
3Unlearnabi...ae.for
windows10-2004-x64
3bayrernes.afv
windows7-x64
3bayrernes.afv
windows10-2004-x64
3Analysis
-
max time kernel
57s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 10:09
Static task
static1
Behavioral task
behavioral1
Sample
FACTURA_240001920.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
FACTURA_240001920.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
document.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
document.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Acclimate.dec
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Acclimate.dec
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ergometerets/marks.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Ergometerets/marks.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Myomectomy.und
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
Myomectomy.und
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Unlearnability/quadding.tyr
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Unlearnability/quadding.tyr
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Unlearnability/termitidae.for
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Unlearnability/termitidae.for
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
bayrernes.afv
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
bayrernes.afv
Resource
win10v2004-20241007-en
General
-
Target
bayrernes.afv
-
Size
453KB
-
MD5
334c7f837a0f72e41601057332c603c9
-
SHA1
d1d92486f8e198af7061c9a0d1a58581dde0f996
-
SHA256
5ab0038204e3cbef3fd931858908121176cd57f84a551681552707eb1abfa59a
-
SHA512
52d077b6e8ab2ffd1ce9e018d1fce59ea48f22b8716bb6dec77a71238f0810156760b96a4a434c05c809983ac36a400fab0375cd72697f5e7171db6e0f3de52d
-
SSDEEP
1536:lbk1LH6GMgXzqftFrKcCFJrNI0DZgzXheDiUKfIXBd66GBG:lkZ6QXzqftocAJrNI0U066Gs
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2744 AcroRd32.exe 2744 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2348 wrote to memory of 352 2348 cmd.exe 31 PID 2348 wrote to memory of 352 2348 cmd.exe 31 PID 2348 wrote to memory of 352 2348 cmd.exe 31 PID 352 wrote to memory of 2744 352 rundll32.exe 32 PID 352 wrote to memory of 2744 352 rundll32.exe 32 PID 352 wrote to memory of 2744 352 rundll32.exe 32 PID 352 wrote to memory of 2744 352 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bayrernes.afv1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bayrernes.afv2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bayrernes.afv"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fee75268cc827887f9f139af1f11e94a
SHA194f4b35229e4d5e0202513ab1fb74f5223c6c759
SHA2564ea7da92ca58faa862ec0ed44f4fec39b84155e8701f83f56b60888ffa7c2896
SHA51292834c07d76edba3b53b4a5b219a6b60217acecf77cc4b05fed00aa69666c8e32e6aa9988dd01b56fe601d7e2f7ef22f795c3e6ba5b456149388bb07ca53196e