Overview
overview
10Static
static
3Pago.rar
windows7-x64
1Pago.rar
windows10-2004-x64
1Skery.exe
windows7-x64
7Skery.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Cyberangre...29.bus
windows7-x64
3Cyberangre...29.bus
windows10-2004-x64
3Cyberangre...ic.ini
windows7-x64
1Cyberangre...ic.ini
windows10-2004-x64
1Cyberangre...gon250
windows7-x64
3Cyberangre...gon250
windows10-2004-x64
3Cyberangre...51.jpg
windows7-x64
3Cyberangre...51.jpg
windows10-2004-x64
4Cyberangre...es.txt
windows7-x64
1Cyberangre...es.txt
windows10-2004-x64
1Cyberangre...gs.txt
windows7-x64
1Cyberangre...gs.txt
windows10-2004-x64
1Cyberangre...ry.pad
windows7-x64
3Cyberangre...ry.pad
windows10-2004-x64
3Cyberangre...rs.txt
windows7-x64
1Cyberangre...rs.txt
windows10-2004-x64
1Cyberangre...ns.txt
windows7-x64
1Cyberangre...ns.txt
windows10-2004-x64
1Cyberangre...ne.int
windows7-x64
3Cyberangre...ne.int
windows10-2004-x64
3Cyberangre...ca.rei
windows7-x64
3Cyberangre...ca.rei
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/02/2025, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
Pago.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Pago.rar
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Skery.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Skery.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Cyberangreb/Acanthopterous29.bus
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Cyberangreb/Acanthopterous29.bus
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Cyberangreb/Aphthartodocetic.ini
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Cyberangreb/Aphthartodocetic.ini
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Cyberangreb/Repetatively/Fljtetndes.gon250
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Cyberangreb/Repetatively/Fljtetndes.gon250
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Cyberangreb/Repetatively/Innovativeness151.jpg
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Cyberangreb/Repetatively/Innovativeness151.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Cyberangreb/Repetatively/desorienteres.txt
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
Cyberangreb/Repetatively/desorienteres.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Cyberangreb/Repetatively/gennemskylnings.txt
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Cyberangreb/Repetatively/gennemskylnings.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Cyberangreb/Repetatively/gerry.pad
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Cyberangreb/Repetatively/gerry.pad
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Cyberangreb/Repetatively/inkassogebyrers.txt
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Cyberangreb/Repetatively/inkassogebyrers.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Cyberangreb/Repetatively/klasikkens.txt
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Cyberangreb/Repetatively/klasikkens.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Cyberangreb/Repetatively/opdateringssiderne.int
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
Cyberangreb/Repetatively/opdateringssiderne.int
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Cyberangreb/Repetatively/pataca.rei
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Cyberangreb/Repetatively/pataca.rei
Resource
win10v2004-20250217-en
General
-
Target
Cyberangreb/Acanthopterous29.bus
-
Size
204KB
-
MD5
566babc802e773a29bb44f167b8f0174
-
SHA1
999d16a5e7a9d26e846ad4c0e7eb3aa6e844cc2c
-
SHA256
d78c7bf755f26aa42c1f9a9be74d10c22eb81760b2b5ca664a56aa559b63c781
-
SHA512
0111fd8f094f3e025c92a71b4d289439574d21d881e14ecb34f3f5a3f60e84b58637e0b55f0aa4269b18b24e9fe046491f0ec474467d17739a79e3647ca4e137
-
SSDEEP
6144:A8KQEhQiWL6SvQ4huRk+tlJvpCaIzCX4CjTI:A8WQhlQ4huL7vX1oCjTI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2820 AcroRd32.exe 2820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2852 3004 cmd.exe 31 PID 3004 wrote to memory of 2852 3004 cmd.exe 31 PID 3004 wrote to memory of 2852 3004 cmd.exe 31 PID 2852 wrote to memory of 2820 2852 rundll32.exe 32 PID 2852 wrote to memory of 2820 2852 rundll32.exe 32 PID 2852 wrote to memory of 2820 2852 rundll32.exe 32 PID 2852 wrote to memory of 2820 2852 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Cyberangreb\Acanthopterous29.bus1⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Cyberangreb\Acanthopterous29.bus2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Cyberangreb\Acanthopterous29.bus"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58035fae00bbd4d21015dcf98aca41c34
SHA1954f384952223f854986016a59f051bf9dd6847f
SHA25603d73df3e191fa4e630e310ad21accb21b7d07f68b093b4c85b429bfb5441ff7
SHA51290824ec314bc450b253aed2eeb42641b7c21bf33e604c235240c469987cf9eb7404f60930b95933122e2de8bdc74de067e12f6bc7fe7c89aa5fa9cf7739776d1