Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
Inv.80967568.Scan.pdf.....exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Inv.80967568.Scan.pdf.....exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/blgyqihyvgd.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/blgyqihyvgd.dll
Resource
win10v2004-20241007-en
General
-
Target
Inv.80967568.Scan.pdf.....exe
-
Size
321KB
-
MD5
0fdcc8266884dd687604486514c6634c
-
SHA1
afdabfb1c31580bbda9a1722e6e0839bd32df3f9
-
SHA256
e4447b89d65251cb238f02c538cf01488628c61ac709f195535feec8e18ec9e3
-
SHA512
1e08f28e87c26a13645b23f4d0ca209feeaa252357bf9a294556771c24bd261e627bde1603d0947d7aed2de0b366c27eb520527b978e0fd2cafc0ea9016ac023
-
SSDEEP
6144:18LxBz9FLFYq1kvN/o7QFPRVbaVmVP7BlpFFxNwzR:49FLFd1ktoMFPcmFLpjiR
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 640 Inv.80967568.Scan.pdf.....exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inv.80967568.Scan.pdf.....exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 640 wrote to memory of 4908 640 Inv.80967568.Scan.pdf.....exe 82 PID 640 wrote to memory of 4908 640 Inv.80967568.Scan.pdf.....exe 82 PID 640 wrote to memory of 4908 640 Inv.80967568.Scan.pdf.....exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inv.80967568.Scan.pdf.....exe"C:\Users\Admin\AppData\Local\Temp\Inv.80967568.Scan.pdf.....exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Inv.80967568.Scan.pdf.....exe"C:\Users\Admin\AppData\Local\Temp\Inv.80967568.Scan.pdf.....exe"2⤵PID:4908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5aff7a15a068a40996bbec6d2f8fe510a
SHA1c05a992dc17306bb507bfa0b5e4d68edd8809c99
SHA25686ec7cf90bd0ca677b897807c5391958e539890822e607a5087035308e527f64
SHA512cda72fff7af615df8a5f407ddde60c013ccb0816a30a32673eefa8973101f87039b95e466078b764298c3890cdbfe6b02dc65a7b7bff3ab81514507bccf139bd