Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
inv300123.pdf.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
inv300123.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nqdipsrotb.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nqdipsrotb.dll
Resource
win10v2004-20241007-en
General
-
Target
inv300123.pdf.exe
-
Size
249KB
-
MD5
c1d715af9940a5e70e1ab58fecc18dba
-
SHA1
a223f8c86b1748e3f7bccccd13c864507505e09c
-
SHA256
3b49db8324bc576c3d9e31d4bd1c27af48f3ec36652b95991a3b4803c6a48ad8
-
SHA512
99fef3200ab3cf200a4d23ed95edbbc7005b856b599a2b832bedf9cb16ffc62dc6f5bc6c073a95e3f473b055621e4e022801c72ff4c0ab818253fdba59cafd53
-
SSDEEP
6144:wBlL/c/QkZXt5dYUpKdCASZEJsfgnv1KhsiGcO3:CezZJ7pDhZEJggnNceH3
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2196 inv300123.pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2452 2196 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inv300123.pdf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4688 2196 inv300123.pdf.exe 83 PID 2196 wrote to memory of 4688 2196 inv300123.pdf.exe 83 PID 2196 wrote to memory of 4688 2196 inv300123.pdf.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\inv300123.pdf.exe"C:\Users\Admin\AppData\Local\Temp\inv300123.pdf.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\inv300123.pdf.exe"C:\Users\Admin\AppData\Local\Temp\inv300123.pdf.exe"2⤵PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 10402⤵
- Program crash
PID:2452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2196 -ip 21961⤵PID:3944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD58ab953e111816f48fd4aab119809af53
SHA15ad3c9b13395ea5912bbff13746171a387f43979
SHA256cb989078f012a4f8f8fe2b0ee20790a792dc6f1968cb0bba55f654ffb3346c20
SHA51275b37e5fcc1994686eb91316ef45ec46e9ada54cbe985e9671c8e0d09a153ddb6bbfd2881dc278c6b351c6a022d1db6c33b6b7a7ce73b0eb4af5a84ca2e7e421