Overview
overview
10Static
static
3Quote-SA05...df.exe
windows7-x64
10Quote-SA05...df.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Aborning/O...23.ini
windows7-x64
1Aborning/O...23.ini
windows10-2004-x64
1Aborning/P...93.jpg
windows7-x64
3Aborning/P...93.jpg
windows10-2004-x64
4Aborning/R...es.txt
windows7-x64
1Aborning/R...es.txt
windows10-2004-x64
1Aborning/R...es.dru
windows7-x64
3Aborning/R...es.dru
windows10-2004-x64
3Aborning/R...ns.ind
windows7-x64
3Aborning/R...ns.ind
windows10-2004-x64
3Aborning/R...ds.txt
windows7-x64
1Aborning/R...ds.txt
windows10-2004-x64
1Aborning/R...et.jpg
windows7-x64
3Aborning/R...et.jpg
windows10-2004-x64
4Aborning/R...ic.txt
windows7-x64
1Aborning/R...ic.txt
windows10-2004-x64
1Aborning/R...te.cal
windows7-x64
3Aborning/R...te.cal
windows10-2004-x64
3Aborning/R...ie.ini
windows7-x64
1Aborning/R...ie.ini
windows10-2004-x64
1Aborning/V...88.txt
windows7-x64
1Aborning/V...88.txt
windows10-2004-x64
1Aborning/enrapts.txt
windows7-x64
1Aborning/enrapts.txt
windows10-2004-x64
1Aborning/f...es.sej
windows7-x64
3Aborning/f...es.sej
windows10-2004-x64
3Anisbolsjet166.ini
windows7-x64
1Anisbolsjet166.ini
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
Quote-SA05537809567875351061-24_pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Quote-SA05537809567875351061-24_pdf.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Aborning/Opsendelsens23.ini
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Aborning/Opsendelsens23.ini
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Aborning/Porriwiggle193.jpg
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Aborning/Porriwiggle193.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Aborning/Ramesside/Retransmute/swamies.txt
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Aborning/Ramesside/Retransmute/swamies.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Aborning/Ramesside/Retransmute/tonsenes.dru
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Aborning/Ramesside/Retransmute/tonsenes.dru
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Aborning/Ramesside/hundesldens.ind
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Aborning/Ramesside/hundesldens.ind
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Aborning/Ramesside/myriapods.txt
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Aborning/Ramesside/myriapods.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Aborning/Ramesside/romanidealet.jpg
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
Aborning/Ramesside/romanidealet.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Aborning/Ramesside/spermatozoic.txt
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Aborning/Ramesside/spermatozoic.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Aborning/Ramesside/springsttte.cal
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Aborning/Ramesside/springsttte.cal
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Aborning/Ramesside/sumlinie.ini
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Aborning/Ramesside/sumlinie.ini
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Aborning/Viljefastheden188.txt
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
Aborning/Viljefastheden188.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Aborning/enrapts.txt
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Aborning/enrapts.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
Aborning/fiskefrikadellernes.sej
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
Aborning/fiskefrikadellernes.sej
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
Anisbolsjet166.ini
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Anisbolsjet166.ini
Resource
win10v2004-20250217-en
General
-
Target
Aborning/fiskefrikadellernes.sej
-
Size
1.6MB
-
MD5
454478452bb337ea3ccfac2f770e8bf1
-
SHA1
98546d044240a9fa7cb587d63778d0090eedb4e1
-
SHA256
5f10fe94c897b947c37258652b64150df4732fc635601bddba2b8507df71d531
-
SHA512
7eab9edf076aa7322961330d788ea6cfe975ab58f09b929b1574ac939acdba48d7517e64a44745b207064995fa3f9e6a3c0d33b8776c4183adfede0cb6a34c4a
-
SSDEEP
1536:olQHLPwK1QgewZgP1T6c8aH7BfBkhcD1TN5fob1QvG5l9CsOkQfDvtnQzTncLrpP:Ezp
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2992 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2992 AcroRd32.exe 2992 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2252 3032 cmd.exe 31 PID 3032 wrote to memory of 2252 3032 cmd.exe 31 PID 3032 wrote to memory of 2252 3032 cmd.exe 31 PID 2252 wrote to memory of 2992 2252 rundll32.exe 33 PID 2252 wrote to memory of 2992 2252 rundll32.exe 33 PID 2252 wrote to memory of 2992 2252 rundll32.exe 33 PID 2252 wrote to memory of 2992 2252 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Aborning\fiskefrikadellernes.sej1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Aborning\fiskefrikadellernes.sej2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Aborning\fiskefrikadellernes.sej"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD505b5e46b88973912f7b16a55e81983ad
SHA176008131f08bef1dbe1664762b426d95c3e3151b
SHA2561299a52e562f9c97c948eb3e128f48b6257c340b7781e3a7a325ab123baf1f67
SHA512fcad6175d543616097c0a3f3f2a1f2a3c62231a926ade31de3749c91727cf6d1eda7ea9c2ad286c4bf23b11bd1e47aaf0bdf7a27f71ddaaadb50e2c0d52ea25d