Overview
overview
10Static
static
1DOCUMET788...@!.exe
windows7-x64
8DOCUMET788...@!.exe
windows10-2004-x64
10Flanr.fje
windows7-x64
3Flanr.fje
windows10-2004-x64
3Krieker213.ps1
windows7-x64
3Krieker213.ps1
windows10-2004-x64
8Modisterne.pse
windows7-x64
3Modisterne.pse
windows10-2004-x64
3Uncleanness.eug
windows7-x64
3Uncleanness.eug
windows10-2004-x64
3dendropogon.txt
windows7-x64
1dendropogon.txt
windows10-2004-x64
1hjemstedsk...ne.cel
windows7-x64
3hjemstedsk...ne.cel
windows10-2004-x64
3olieraffin...rs.fat
windows7-x64
3olieraffin...rs.fat
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 08:58
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMET7887RAMADA@#$@!.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
DOCUMET7887RAMADA@#$@!.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Flanr.fje
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Flanr.fje
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Krieker213.ps1
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Krieker213.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Modisterne.pse
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Modisterne.pse
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Uncleanness.eug
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Uncleanness.eug
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
dendropogon.txt
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
dendropogon.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
hjemstedskommunerne.cel
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
hjemstedskommunerne.cel
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
olieraffinaderiers.fat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
olieraffinaderiers.fat
Resource
win10v2004-20241007-en
General
-
Target
hjemstedskommunerne.cel
-
Size
3.0MB
-
MD5
2493fb6b8d7bbb76227c9d5f0cbb9b97
-
SHA1
da2f39f5f70c05407408509edccddeb325f651b5
-
SHA256
b7d2297a871efcee3b580e91c2100e98adbf92df74a27847e24ecd4448c0bb60
-
SHA512
64d2fe91f4e0fb972a87f7da80cf80d7e4b6b61c6c287272818cdcbd4f2b7a4fa5302b9ad37209933efeebdb36132c0098573eedd4ee4617434294580845ecfc
-
SSDEEP
768:+uWhkgov4Xs/Y4pWD98LFtBhJHd5jBKXN85WI38KFdIVejTiWKBMNmA5T0upj02b:tjg0+5bBa185xqGvS5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2596 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2596 AcroRd32.exe 2596 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2668 2756 cmd.exe 31 PID 2756 wrote to memory of 2668 2756 cmd.exe 31 PID 2756 wrote to memory of 2668 2756 cmd.exe 31 PID 2668 wrote to memory of 2596 2668 rundll32.exe 32 PID 2668 wrote to memory of 2596 2668 rundll32.exe 32 PID 2668 wrote to memory of 2596 2668 rundll32.exe 32 PID 2668 wrote to memory of 2596 2668 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\hjemstedskommunerne.cel1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\hjemstedskommunerne.cel2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\hjemstedskommunerne.cel"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f133763bb1112979aad7af0eccacdcd5
SHA1fa572fafd7cb56d1612ca4e232629a8b0d319c92
SHA2568b08ac91263b7cd4346c6b3a9595b36640f9b2526a11628eb216816234e403d6
SHA512dbec82dd011c9f9222a60f5497b1d03376a3222597f2bb0e86d0fff06495232308d2cd38cdf4ad9aba2f1eeaebf46bf695e4205a900ada967753ee4c680bf8cd