Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
villa-RE/villa-rechnung.url
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
villa-RE/villa-rechnung.url
Resource
win10v2004-20241007-en
General
-
Target
villa-RE/villa-rechnung.url
-
Size
169B
-
MD5
cb8afd706883ce927dc83f034986e2dc
-
SHA1
3d85aed17a6a9337536cedafc0f966040ea94770
-
SHA256
038c96a02627b159cf27cf05c2925750ba4c4135c03e4f564fc41ddf7cd5bdd2
-
SHA512
71cada2a23e153c6306b78985fcbf4e4a49e7d87c9b1ddda80958ebfcc16489cfead9c16ab8a4f7de78ee28207079b0c060c4db21c98c3248cf708e4a75af092
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 msdt.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2300 1968 rundll32.exe 31 PID 1968 wrote to memory of 2300 1968 rundll32.exe 31 PID 1968 wrote to memory of 2300 1968 rundll32.exe 31 PID 2300 wrote to memory of 2464 2300 rundll32.exe 32 PID 2300 wrote to memory of 2464 2300 rundll32.exe 32 PID 2300 wrote to memory of 2464 2300 rundll32.exe 32
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\villa-RE\villa-rechnung.url1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" ndfapi.dll,NdfRunDllDiagnoseWithAnswerFile NetworkDiagnosticsSharing C:\Users\Admin\AppData\Local\Temp\NDF8575.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\msdt.exe-skip TRUE -path C:\Windows\diagnostics\system\networking -af C:\Users\Admin\AppData\Local\Temp\NDF8575.tmp -ep NetworkDiagnosticsSharing3⤵
- Suspicious use of FindShellTrayWindow
PID:2464
-
-
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\460911090\2024123012.000\NetworkDiagnostics.0.debugreport.xml
Filesize64KB
MD56034e3231f6f89fda2581274ac9b04dd
SHA1e34308a1498dade0df7eb3fb9e44ed5c11f95b26
SHA25685ede1098a19401f614effa5692366c748575ca5d9f9aedc1a5235e414f65ae4
SHA51267a01a7d33683c350a5a1f949b22fe19ce43d29eb587f1fdfbab6d197f5a9121ea4ea2ce1d653074a69e45195377b9a0f945f352f4304858e99a540f47177405
-
Filesize
2KB
MD57f63940274cf6c3286fbd7f510f00e60
SHA161a57f60bbfdde3d8a867ac11a5a1ec1a18e2090
SHA25668e69d8df3227e7dc163b475b40fec114a2f1db2b6bba5719f05505e70e79771
SHA512bf60f846c89963a625d0509a4bfcc2bec0b00ec543afaab3d1e92ca1b03e47c9984600f3f33945f59bfa839203c5bac4b8ebf2d4f50d1ea76868a62dcfc16edb
-
Filesize
23KB
MD51d192ce36953dbb7dc7ee0d04c57ad8d
SHA17008e759cb47bf74a4ea4cd911de158ef00ace84
SHA256935a231924ae5d4a017b0c99d4a5f3904ef280cea4b3f727d365283e26e8a756
SHA512e864ac74e9425a6c7f1be2bbc87df9423408e16429cb61fa1de8875356226293aa07558b2fafdd5d0597254474204f5ba181f4e96c2bc754f1f414748f80a129
-
Filesize
52KB
MD52f7c3db0c268cf1cf506fe6e8aecb8a0
SHA1fb35af6b329d60b0ec92e24230eafc8e12b0a9f9
SHA256886a625f71e0c35e5722423ed3aa0f5bff8d120356578ab81a64de2ab73d47f3
SHA512322f2b1404a59ee86c492b58d56b8a6ed6ebc9b844a8c38b7bb0b0675234a3d5cfc9f1d08c38c218070e60ce949aa5322de7a2f87f952e8e653d0ca34ff0de45
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD5dc9be0fdf9a4e01693cfb7d8a0d49054
SHA174730fd9c9bd4537fd9a353fe4eafce9fcc105e6
SHA256944186cd57d6adc23a9c28fc271ed92dd56efd6f3bb7c9826f7208ea1a1db440
SHA51292ad96fa6b221882a481b36ff2b7114539eb65be46ee9e3139e45b72da80aac49174155483cba6254b10fff31f0119f07cbc529b1b69c45234c7bb61766aad66
-
Filesize
478KB
MD54dae3266ab0bdb38766836008bf2c408
SHA11748737e777752491b2a147b7e5360eda4276364
SHA256d2ff079b3f9a577f22856d1be0217376f140fcf156e3adf27ebe6149c9fd225a
SHA51291fb8abd1832d785cd5a20da42c5143cd87a8ef49196c06cfb57a7a8de607f39543e8a36be9207842a992769b1c3c55d557519e59063f1f263b499f01887b01b
-
Filesize
13KB
MD51ccc67c44ae56a3b45cc256374e75ee1
SHA1bbfc04c4b0220ae38fa3f3e2ea52b7370436ed1f
SHA256030191d10ffb98cecd3f09ebdc606c768aaf566872f718303592fff06ba51367
SHA512b67241f4ad582e50a32f0ecf53c11796aef9e5b125c4be02511e310b85bdfa3796579bbf3f0c8fe5f106a5591ec85e66d89e062b792ea38ca29cb3b03802f6c6