Overview
overview
10Static
static
101PDF.Fatur...07.exe
windows7-x64
81PDF.Fatur...07.exe
windows10-2004-x64
83e6642f710...5e.exe
windows7-x64
103e6642f710...5e.exe
windows10-2004-x64
104c40337094...92.exe
windows7-x64
104c40337094...92.exe
windows10-2004-x64
10644d928a4a...25.exe
windows7-x64
10644d928a4a...25.exe
windows10-2004-x64
1064ec6562b9...2e.exe
windows7-x64
1064ec6562b9...2e.exe
windows10-2004-x64
107a0395c75a...8e.exe
windows7-x64
107a0395c75a...8e.exe
windows10-2004-x64
10901478668c...d4.exe
windows7-x64
10901478668c...d4.exe
windows10-2004-x64
10938b7e042b...98.exe
windows7-x64
10938b7e042b...98.exe
windows10-2004-x64
1096d1bc7dec...b7.exe
windows7-x64
1096d1bc7dec...b7.exe
windows10-2004-x64
10Built.exe
windows7-x64
7Built.exe
windows10-2004-x64
8DHL_PT5638...53.bat
windows7-x64
8DHL_PT5638...53.bat
windows10-2004-x64
8DTLite.exe
windows7-x64
10DTLite.exe
windows10-2004-x64
10PDF.Fatura...07.exe
windows7-x64
8PDF.Fatura...07.exe
windows10-2004-x64
8PDF.exe
windows7-x64
10PDF.exe
windows10-2004-x64
10SIP.03746.XSLSX.exe
windows7-x64
8SIP.03746.XSLSX.exe
windows10-2004-x64
8a33245a27c...8a.exe
windows7-x64
10a33245a27c...8a.exe
windows10-2004-x64
10Resubmissions
21-01-2025 11:18
250121-nef6aa1jfx 10Analysis
-
max time kernel
141s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 11:18
Behavioral task
behavioral1
Sample
1PDF.FaturaDetay_202407.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1PDF.FaturaDetay_202407.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
3e6642f7100bb72137d68b5aa34a2d1f1a75722ab7d2b15987bbdeb84bc3265e.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
3e6642f7100bb72137d68b5aa34a2d1f1a75722ab7d2b15987bbdeb84bc3265e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
4c40337094cf0bb86fad86d2ea724ac6e6a499f0acd877839a69d35c354a7792.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
4c40337094cf0bb86fad86d2ea724ac6e6a499f0acd877839a69d35c354a7792.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
644d928a4a942f6ae4c90640103b595941f7a0b557ba49d122d137b1429c0325.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
644d928a4a942f6ae4c90640103b595941f7a0b557ba49d122d137b1429c0325.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
64ec6562b96016699c6ae14166f4d31bde2b160eaa84d34a661fc2943017202e.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
64ec6562b96016699c6ae14166f4d31bde2b160eaa84d34a661fc2943017202e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
7a0395c75ac633d66a7a9f2690cbdb9c90ac5b0fc4f9273b6e0cf16f70eedd8e.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
7a0395c75ac633d66a7a9f2690cbdb9c90ac5b0fc4f9273b6e0cf16f70eedd8e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
901478668c0d5ecb3b5044dcb3e1744045f7b2a800a7c0c67020d9294470f3d4.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
901478668c0d5ecb3b5044dcb3e1744045f7b2a800a7c0c67020d9294470f3d4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
96d1bc7dec91a7a4e5fe653853a504e07d17e898fa437cf75e929fa909dd6bb7.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
96d1bc7dec91a7a4e5fe653853a504e07d17e898fa437cf75e929fa909dd6bb7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Built.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Built.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
DHL_PT563857935689275783656385FV-GDS3535353.bat
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
DHL_PT563857935689275783656385FV-GDS3535353.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
DTLite.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
DTLite.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
PDF.FaturaDetay_202407.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
PDF.FaturaDetay_202407.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
PDF.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
PDF.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
SIP.03746.XSLSX.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
SIP.03746.XSLSX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe
Resource
win10v2004-20241007-en
General
-
Target
1PDF.FaturaDetay_202407.exe
-
Size
323KB
-
MD5
d8bf792f818877bf4848fde9511caeb8
-
SHA1
a8aea1abb7cf1ddb275584bb5746c97790342e80
-
SHA256
f5d96127b34730cf3bbbccd1c35098873fc0af897cc5d6dc3dd39a8e64c511d7
-
SHA512
28292c32d518cecb66ef0a41f583022b6c125ae758fb013dd51896c25625cc23da2a8604d794e2198939f994d15bec09d9b67003bc5bd734d27b15b167e1ebe4
-
SSDEEP
6144:CZABbWqsE/Ao+mv8Qv0LVmwq4FU0fNoy6BLtsorUC7ggXpTILMYSQpIIQENMshQt:kANwRo+mv8QD4+0V161tTNjkIIFN5c
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2128 powershell.exe -
Executes dropped EXE 5 IoCs
pid Process 2512 RootDesign.exe 1832 RootDesign.exe 1408 RootDesign.exe 972 RootDesign.exe 2892 RootDesign.exe -
Loads dropped DLL 3 IoCs
pid Process 2304 powershell.exe 2304 powershell.exe 2304 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUqdates = "C:\\TheDream\\RootDesign.exe" RootDesign.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Window 1 TTPs 1 IoCs
Windows that would typically be displayed when an application carries out an operation can be hidden.
pid Process 2916 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RootDesign.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RootDesign.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RootDesign.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RootDesign.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RootDesign.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1PDF.FaturaDetay_202407.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2128 powershell.exe 2304 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2128 powershell.exe Token: SeDebugPrivilege 2304 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2916 1736 1PDF.FaturaDetay_202407.exe 30 PID 1736 wrote to memory of 2916 1736 1PDF.FaturaDetay_202407.exe 30 PID 1736 wrote to memory of 2916 1736 1PDF.FaturaDetay_202407.exe 30 PID 1736 wrote to memory of 2916 1736 1PDF.FaturaDetay_202407.exe 30 PID 2916 wrote to memory of 2128 2916 cmd.exe 32 PID 2916 wrote to memory of 2128 2916 cmd.exe 32 PID 2916 wrote to memory of 2128 2916 cmd.exe 32 PID 2916 wrote to memory of 2128 2916 cmd.exe 32 PID 2128 wrote to memory of 2304 2128 powershell.exe 33 PID 2128 wrote to memory of 2304 2128 powershell.exe 33 PID 2128 wrote to memory of 2304 2128 powershell.exe 33 PID 2128 wrote to memory of 2304 2128 powershell.exe 33 PID 2304 wrote to memory of 2512 2304 powershell.exe 34 PID 2304 wrote to memory of 2512 2304 powershell.exe 34 PID 2304 wrote to memory of 2512 2304 powershell.exe 34 PID 2304 wrote to memory of 2512 2304 powershell.exe 34 PID 2512 wrote to memory of 1832 2512 RootDesign.exe 37 PID 2512 wrote to memory of 1832 2512 RootDesign.exe 37 PID 2512 wrote to memory of 1832 2512 RootDesign.exe 37 PID 2512 wrote to memory of 1832 2512 RootDesign.exe 37 PID 1832 wrote to memory of 1408 1832 RootDesign.exe 38 PID 1832 wrote to memory of 1408 1832 RootDesign.exe 38 PID 1832 wrote to memory of 1408 1832 RootDesign.exe 38 PID 1832 wrote to memory of 1408 1832 RootDesign.exe 38 PID 1408 wrote to memory of 972 1408 RootDesign.exe 39 PID 1408 wrote to memory of 972 1408 RootDesign.exe 39 PID 1408 wrote to memory of 972 1408 RootDesign.exe 39 PID 1408 wrote to memory of 972 1408 RootDesign.exe 39 PID 972 wrote to memory of 2892 972 RootDesign.exe 41 PID 972 wrote to memory of 2892 972 RootDesign.exe 41 PID 972 wrote to memory of 2892 972 RootDesign.exe 41 PID 972 wrote to memory of 2892 972 RootDesign.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\1PDF.FaturaDetay_202407.exe"C:\Users\Admin\AppData\Local\Temp\1PDF.FaturaDetay_202407.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c PowerShell.exe -windowstyle hidden powershell -c C:\TheDream\RootDesign.exe2⤵
- Hide Artifacts: Hidden Window
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -windowstyle hidden powershell -c C:\TheDream\RootDesign.exe3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c C:\TheDream\RootDesign.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:972 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"10⤵PID:2324
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD56973b88e8ca2c8c4ad67369cd211a49f
SHA1cce768cc4a13cf8edd1841add873c2b0dea1738b
SHA256b060331cb9f98d15d3fe25b8a311dc431c84a85bfa06426ad80cc3bef5b924ec
SHA51235e2ddc683fea47325d6c7374a6a93faa71d52185b2f0f127a9cf7dec0f2347b12668eb668a267314443ed511b5e7d939f1f93640b9c6425fcc660d42f35d945
-
Filesize
33B
MD5b1eec1f4ab428032df8fe89e1126d0eb
SHA1545171c320602c976b0fc13754ddbb307724e0aa
SHA256c3b9233cb90ee38b6916f27a84fcbfbd70e7d59f792a4a191e5b6adb87ca75f1
SHA512f5f624a15f1f6910c25e5c1f7b292345062378972c07106c64d7139def46ee3dea7e3b99ba4216c2cd7d84a7a82906b0092b97edff86865b5e73b12156edea1a
-
Filesize
48B
MD51d89a8d548de37e16541372cc27300af
SHA15fd89d509296bf368c2e498a0bc72e04aea596f5
SHA25693e10bc4fe7068fe7564384e1d32d850b97183d54067dcd7618c6c21aabb94fa
SHA512ee0ff6bec74732277459a9a81e147e4dcc194fa8f5b57406b68424220b16f9b5ddf2a26c063566d1e120afbda37b59fc36adb94f1b7308989fa1055400e19258
-
Filesize
63B
MD5f81d9e83620c89bfde85ab2941bb0376
SHA11fbfcc09f799a24f82e678ca1c474e1ab1f63a52
SHA256385d6c604a215eb5866ae59f63656fb58d0af0782156a1546de47682174807d7
SHA512b12f842f8b9f2faf6b1bca1b637b4b54821b9a9c473974322cf3af80e6eac21e398ff16d03546a94733b94909e71553a45814a9dd669dfbb9b9c6a1dd0407a5b
-
Filesize
78B
MD5e5194869aa1e865bef36ee36b51aa863
SHA151e5896c5ae667ab0c3a6a7206a22d0332d2aa45
SHA2564c8c1f2d9ef8192c3afd48d716c3c572acbde061dad28c93b96b4dd322094ee4
SHA512ed523b4f21f15d1ce5c05b0856a58b45a51894e572f7dcafbc7ebb82fbf0164b9375635a0328636011e185f0b8874446c266a7591112abd23065457eb9f52747
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD55a4f2c15739c2857f1c7dd5289f50bc0
SHA1124b8683e7a6ab5d26cd95615c2eeda2f4c07b96
SHA256da770d48e21dde2b60a009008f4dcb9236ce0cb0387912b8e875dd3485fd6527
SHA51221fb08f8d3c13ab05b2337876e8146796c3a5b2717e65390d3808666af90dd90ea6c5f800899e35db8512fbca68f847e0d38f4121d94dcabca7e80c6ee8d7e07
-
Filesize
1KB
MD5934c538703a8d75fc9452968bd4153e4
SHA1f85647d373dcafe1dc6c54d2fef2a6cb192a5172
SHA25604ead23fabb8ebae8d2e271624b5059a89300c6ae824469b671d26dc5d72208d
SHA5127112ac70c40ab61bfa68151ac78ff6ebee02ee8a61869ae0f083bd5fbc8d22ff585ecbb59156694cf17072363d4ffb4bf1bb51b9194e697e1bf1827f79ac0c05
-
Filesize
126KB
MD5ba563203779c4ad6b2e619c42463f4a8
SHA1d85458664b6c971d2e24da84a2dbbb88a03fc542
SHA256a5794b8e199ca1a7c35cb4d393282fde4a73e9f9190153e97a13eb9baf3a35e6
SHA5126a6b85d228ac630f6468965d5b8c66d2f7edc07f1a18444debc22b46a7923fe7021e4219cb3513ac1996d6b36052d64455267836835f5df12961039a1b858849