Analysis
-
max time kernel
0s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2025, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
BANK SLIP_TT COPY_0300773456864-2-18-2024_pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BANK SLIP_TT COPY_0300773456864-2-18-2024_pdf.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
General
-
Target
BANK SLIP_TT COPY_0300773456864-2-18-2024_pdf.exe
-
Size
1.1MB
-
MD5
9128969e93ac57f522abc5227578cddb
-
SHA1
5cb95261c1ed942db7907fd4a20c1af9ed919435
-
SHA256
cb4256d0f27ba049bb573a28922aff4011277a69a5f1804915c90988c5795cf9
-
SHA512
6c6ae3694b4e54cc809b4c8d780e1857ad975c31c80dd4a8e4d73e83c094b81d0fbcf4995dda166f97c860e99c772e3d2d207936c0aa0fe2f3b9c5616a198152
-
SSDEEP
24576:BFiUSSXR5LCSANglv5Fsjq5c3SddFDykNTwdQG9ikd:6Z0H3l5kSdzDPwZi8
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 drive.google.com 22 drive.google.com -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\etageboligomraader\Afbagte.ini BANK SLIP_TT COPY_0300773456864-2-18-2024_pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BANK SLIP_TT COPY_0300773456864-2-18-2024_pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BANK SLIP_TT COPY_0300773456864-2-18-2024_pdf.exe"C:\Users\Admin\AppData\Local\Temp\BANK SLIP_TT COPY_0300773456864-2-18-2024_pdf.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\BANK SLIP_TT COPY_0300773456864-2-18-2024_pdf.exe"C:\Users\Admin\AppData\Local\Temp\BANK SLIP_TT COPY_0300773456864-2-18-2024_pdf.exe"2⤵PID:4004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5ee260c45e97b62a5e42f17460d406068
SHA1df35f6300a03c4d3d3bd69752574426296b78695
SHA256e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27
SHA512a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3