Overview
overview
10Static
static
3SbieCtrl.exe
windows7-x64
1SbieCtrl.exe
windows10-2004-x64
10SbieDll.dll
windows7-x64
1SbieDll.dll
windows10-2004-x64
1medina.rtf
windows7-x64
3medina.rtf
windows10-2004-x64
1steamerror...er.exe
windows7-x64
5steamerror...er.exe
windows10-2004-x64
5tier0_s.dll
windows7-x64
3tier0_s.dll
windows10-2004-x64
3vstdlib_s.dll
windows7-x64
3vstdlib_s.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 16:56
Static task
static1
Behavioral task
behavioral1
Sample
SbieCtrl.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
SbieCtrl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
SbieDll.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
SbieDll.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
medina.rtf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
medina.rtf
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
steamerrorreporter.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
steamerrorreporter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
tier0_s.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
tier0_s.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
vstdlib_s.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
vstdlib_s.dll
Resource
win10v2004-20241007-en
General
-
Target
medina.rtf
-
Size
37KB
-
MD5
d125cedbbfe725a94948561401f0a555
-
SHA1
3b2484f8600f42ebbeb89093b8efeab4cb173c37
-
SHA256
c10719865726f362838d5ac424bfb83679e9c8e27743894faeccc5c2d55dc07f
-
SHA512
18280f1741ff0f3d93d7f476974d736fdf67678fd0e53b277459203679e43fdea48423e4c43122ecc7cf605ca0a197788bb446753f52c24820b1fc1870d9fef5
-
SSDEEP
768:Vec0FGaL4s1gnoQcVn03vM1dKu+olkjW4AcYihDTclVTEK5:EGaL4s1gJ3v6KuJTc9h+L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2360 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2360 WINWORD.EXE 2360 WINWORD.EXE 2360 WINWORD.EXE 2360 WINWORD.EXE 2360 WINWORD.EXE 2360 WINWORD.EXE 2360 WINWORD.EXE 2360 WINWORD.EXE 2360 WINWORD.EXE 2360 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\medina.rtf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2360