General
-
Target
29112024_1601_Rechnungens.zip
-
Size
3KB
-
Sample
241129-tgan6symgn
-
MD5
81b1745ee32e396cfa36eed18b1b2927
-
SHA1
953d7ad0f9d8036fd23f278d5381dd67091e7323
-
SHA256
781f41c23b460a8b90f0bdb4b2cd0c6642bda3883f45464f016fd9c3b44dbb25
-
SHA512
6f0fa3df23002fcc0f66ba3f6ebc2b6394af4ac293b2874176f122e855054f08ba9f4414e89b7cfe7abb368ffbb8ca9de2d89709e879d67126f3357a3e0e9b05
Static task
static1
Behavioral task
behavioral1
Sample
Rechnung_2024_0092.pdf.lnk
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Rechnung_2024_0092.pdf.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Rechnung_2024_0093.pdf.lnk
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Rechnung_2024_0093.pdf.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Rechnung_2024_0094.pdf.lnk
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Rechnung_2024_0094.pdf.lnk
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://pub-fee23c54ae4b464fb3904eebeb70c629.r2.dev/upgrade.hta
Extracted
darkvision
5.206.227.213
Extracted
https://pub-fee23c54ae4b464fb3904eebeb70c629.r2.dev/upgrade.hta
Targets
-
-
Target
Rechnung_2024_0092.pdf.lnk
-
Size
3KB
-
MD5
22c803dba48be47631f50a2bc486663d
-
SHA1
62061211cc2ec3c8d655e0c3217e1e0febb2a4f8
-
SHA256
7626763bffacecfaaad1880271b0ebc95b3bf961fc21a94e83341641d516adec
-
SHA512
258635b1c0428a64ad28f0f3d30d24ead81a9e4413a962c49dc5804606931b26046ca048c1e22b4116d1b7f9148e5dcf9c9c6413c06221fce446601da4826709
-
Darkvision family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
Rechnung_2024_0093.pdf.lnk
-
Size
3KB
-
MD5
22c803dba48be47631f50a2bc486663d
-
SHA1
62061211cc2ec3c8d655e0c3217e1e0febb2a4f8
-
SHA256
7626763bffacecfaaad1880271b0ebc95b3bf961fc21a94e83341641d516adec
-
SHA512
258635b1c0428a64ad28f0f3d30d24ead81a9e4413a962c49dc5804606931b26046ca048c1e22b4116d1b7f9148e5dcf9c9c6413c06221fce446601da4826709
-
Darkvision family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
Rechnung_2024_0094.pdf.lnk
-
Size
3KB
-
MD5
22c803dba48be47631f50a2bc486663d
-
SHA1
62061211cc2ec3c8d655e0c3217e1e0febb2a4f8
-
SHA256
7626763bffacecfaaad1880271b0ebc95b3bf961fc21a94e83341641d516adec
-
SHA512
258635b1c0428a64ad28f0f3d30d24ead81a9e4413a962c49dc5804606931b26046ca048c1e22b4116d1b7f9148e5dcf9c9c6413c06221fce446601da4826709
-
Darkvision family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1