Overview
overview
10Static
static
3Quote-SA05...df.exe
windows7-x64
10Quote-SA05...df.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Aborning/O...23.ini
windows7-x64
1Aborning/O...23.ini
windows10-2004-x64
1Aborning/P...93.jpg
windows7-x64
3Aborning/P...93.jpg
windows10-2004-x64
4Aborning/R...es.txt
windows7-x64
1Aborning/R...es.txt
windows10-2004-x64
1Aborning/R...es.dru
windows7-x64
3Aborning/R...es.dru
windows10-2004-x64
3Aborning/R...ns.ind
windows7-x64
3Aborning/R...ns.ind
windows10-2004-x64
3Aborning/R...ds.txt
windows7-x64
1Aborning/R...ds.txt
windows10-2004-x64
1Aborning/R...et.jpg
windows7-x64
3Aborning/R...et.jpg
windows10-2004-x64
4Aborning/R...ic.txt
windows7-x64
1Aborning/R...ic.txt
windows10-2004-x64
1Aborning/R...te.cal
windows7-x64
3Aborning/R...te.cal
windows10-2004-x64
3Aborning/R...ie.ini
windows7-x64
1Aborning/R...ie.ini
windows10-2004-x64
1Aborning/V...88.txt
windows7-x64
1Aborning/V...88.txt
windows10-2004-x64
1Aborning/enrapts.txt
windows7-x64
1Aborning/enrapts.txt
windows10-2004-x64
1Aborning/f...es.sej
windows7-x64
3Aborning/f...es.sej
windows10-2004-x64
3Anisbolsjet166.ini
windows7-x64
1Anisbolsjet166.ini
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
Quote-SA05537809567875351061-24_pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Quote-SA05537809567875351061-24_pdf.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Aborning/Opsendelsens23.ini
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Aborning/Opsendelsens23.ini
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Aborning/Porriwiggle193.jpg
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Aborning/Porriwiggle193.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Aborning/Ramesside/Retransmute/swamies.txt
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Aborning/Ramesside/Retransmute/swamies.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Aborning/Ramesside/Retransmute/tonsenes.dru
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Aborning/Ramesside/Retransmute/tonsenes.dru
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Aborning/Ramesside/hundesldens.ind
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Aborning/Ramesside/hundesldens.ind
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Aborning/Ramesside/myriapods.txt
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Aborning/Ramesside/myriapods.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Aborning/Ramesside/romanidealet.jpg
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
Aborning/Ramesside/romanidealet.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Aborning/Ramesside/spermatozoic.txt
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Aborning/Ramesside/spermatozoic.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Aborning/Ramesside/springsttte.cal
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Aborning/Ramesside/springsttte.cal
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Aborning/Ramesside/sumlinie.ini
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Aborning/Ramesside/sumlinie.ini
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Aborning/Viljefastheden188.txt
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
Aborning/Viljefastheden188.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Aborning/enrapts.txt
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Aborning/enrapts.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
Aborning/fiskefrikadellernes.sej
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
Aborning/fiskefrikadellernes.sej
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
Anisbolsjet166.ini
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Anisbolsjet166.ini
Resource
win10v2004-20250217-en
General
-
Target
Aborning/Ramesside/Retransmute/tonsenes.dru
-
Size
5.0MB
-
MD5
c9d4c5528d909fdac0389363a06a4c6b
-
SHA1
b2835ad12458651741a74394b56bb18923608ce1
-
SHA256
2ef96f769ea53fbf25a97d97a05af3289b8a7db0cd9ed050c364da550bcc5007
-
SHA512
a8ae0fe64defce3301bb99d17d6c8ae884d17e10046f297e43a8c5e102badcb8e65b56591ad63a6b96e708a05fff7cde401d733174d8a79751fde6ebf63c0889
-
SSDEEP
24576:gW4li6RmUo17heBnQjkX5LFJQvSa1agpqoJ3BTWRDiqFayndhtetaitBu5YFUlLx:m
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2624 AcroRd32.exe 2624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2844 3068 cmd.exe 31 PID 3068 wrote to memory of 2844 3068 cmd.exe 31 PID 3068 wrote to memory of 2844 3068 cmd.exe 31 PID 2844 wrote to memory of 2624 2844 rundll32.exe 32 PID 2844 wrote to memory of 2624 2844 rundll32.exe 32 PID 2844 wrote to memory of 2624 2844 rundll32.exe 32 PID 2844 wrote to memory of 2624 2844 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Aborning\Ramesside\Retransmute\tonsenes.dru1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Aborning\Ramesside\Retransmute\tonsenes.dru2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Aborning\Ramesside\Retransmute\tonsenes.dru"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5aded328d856561abb98ab8816be05185
SHA1fbc52759ff51324757ea0429b01cb416a8b6fe8d
SHA2564816dc706edaae3fcea0a14c0e5d2cdcd8ae91ba01dd1fd100d47888fc01a1b7
SHA512367655c5a3bea13a4d9a2ace3fbc3c298cd3ad2b325b200ab33211f1e295076f8c0a87b91ad5fc1bea8dcd02ce12aee6725cdc7b0674fb01ef4f970041fe0ad0