Overview
overview
10Static
static
3Pago.rar
windows7-x64
1Pago.rar
windows10-2004-x64
1Skery.exe
windows7-x64
7Skery.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Cyberangre...29.bus
windows7-x64
3Cyberangre...29.bus
windows10-2004-x64
3Cyberangre...ic.ini
windows7-x64
1Cyberangre...ic.ini
windows10-2004-x64
1Cyberangre...gon250
windows7-x64
3Cyberangre...gon250
windows10-2004-x64
3Cyberangre...51.jpg
windows7-x64
3Cyberangre...51.jpg
windows10-2004-x64
4Cyberangre...es.txt
windows7-x64
1Cyberangre...es.txt
windows10-2004-x64
1Cyberangre...gs.txt
windows7-x64
1Cyberangre...gs.txt
windows10-2004-x64
1Cyberangre...ry.pad
windows7-x64
3Cyberangre...ry.pad
windows10-2004-x64
3Cyberangre...rs.txt
windows7-x64
1Cyberangre...rs.txt
windows10-2004-x64
1Cyberangre...ns.txt
windows7-x64
1Cyberangre...ns.txt
windows10-2004-x64
1Cyberangre...ne.int
windows7-x64
3Cyberangre...ne.int
windows10-2004-x64
3Cyberangre...ca.rei
windows7-x64
3Cyberangre...ca.rei
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/02/2025, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
Pago.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Pago.rar
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Skery.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Skery.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Cyberangreb/Acanthopterous29.bus
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Cyberangreb/Acanthopterous29.bus
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Cyberangreb/Aphthartodocetic.ini
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Cyberangreb/Aphthartodocetic.ini
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Cyberangreb/Repetatively/Fljtetndes.gon250
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Cyberangreb/Repetatively/Fljtetndes.gon250
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Cyberangreb/Repetatively/Innovativeness151.jpg
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Cyberangreb/Repetatively/Innovativeness151.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Cyberangreb/Repetatively/desorienteres.txt
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
Cyberangreb/Repetatively/desorienteres.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Cyberangreb/Repetatively/gennemskylnings.txt
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Cyberangreb/Repetatively/gennemskylnings.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Cyberangreb/Repetatively/gerry.pad
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Cyberangreb/Repetatively/gerry.pad
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Cyberangreb/Repetatively/inkassogebyrers.txt
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Cyberangreb/Repetatively/inkassogebyrers.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Cyberangreb/Repetatively/klasikkens.txt
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Cyberangreb/Repetatively/klasikkens.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Cyberangreb/Repetatively/opdateringssiderne.int
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
Cyberangreb/Repetatively/opdateringssiderne.int
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Cyberangreb/Repetatively/pataca.rei
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Cyberangreb/Repetatively/pataca.rei
Resource
win10v2004-20250217-en
General
-
Target
Cyberangreb/Repetatively/gerry.pad
-
Size
28KB
-
MD5
766d9ef7530d23758f482b0ab2b54788
-
SHA1
c430e21b1463eceb32d05c6f0909d9821c27a3e7
-
SHA256
7ba4160056fb1b321e5859a9aa1f9c277b9c798b968c34e735f5222710e7ed09
-
SHA512
5bc154b564af204c25d2e7651e3c4c9f9263c3e6a88f149ddbe9892baf0b26079e171aebac4dd334ee8192ec4f2c5d510536a2287ad1eea5bd357aaafabad68f
-
SSDEEP
192:vp3MOAy7WiXB2O1NUcFWb38pStMMI81jeUWBmSF//LzzIxj13gjwKWuQ6SSph7NC:x3vArO7WwNM/JUZe3gjw36z7A
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2860 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2860 AcroRd32.exe 2860 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1968 3044 cmd.exe 31 PID 3044 wrote to memory of 1968 3044 cmd.exe 31 PID 3044 wrote to memory of 1968 3044 cmd.exe 31 PID 1968 wrote to memory of 2860 1968 rundll32.exe 32 PID 1968 wrote to memory of 2860 1968 rundll32.exe 32 PID 1968 wrote to memory of 2860 1968 rundll32.exe 32 PID 1968 wrote to memory of 2860 1968 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Cyberangreb\Repetatively\gerry.pad1⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Cyberangreb\Repetatively\gerry.pad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Cyberangreb\Repetatively\gerry.pad"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD533181e98ac1d15d248fc369999f516fb
SHA1c801f3e3e6d0fa7e68736792f81a71ff9d3de49b
SHA256e342db5ea9fc47c30ef395c011780c57cadb5834da9ac1d795f771745829fdd2
SHA5125d4861cc14124fe77f2ba074e0172bdcc9511a08b16f9a4beb045dee37cd71622ed64d82731598bc7e2ac82019fe6ea708a7690bc2bb7a94bbda0580e5afb06f