Overview
overview
10Static
static
349b298624d...19.exe
windows7-x64
1049b298624d...19.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Ekspositionsdelen.afd
windows7-x64
3Ekspositionsdelen.afd
windows10-2004-x64
3Festmaaltidet.bas
windows7-x64
3Festmaaltidet.bas
windows10-2004-x64
3Unrhymed.adi
windows7-x64
3Unrhymed.adi
windows10-2004-x64
3apotekerbe...gs.jpg
windows7-x64
3apotekerbe...gs.jpg
windows10-2004-x64
4christians...ne.deh
windows7-x64
3christians...ne.deh
windows10-2004-x64
3claudius.jpg
windows7-x64
3claudius.jpg
windows10-2004-x64
4lumpenhede...ns.bra
windows7-x64
3lumpenhede...ns.bra
windows10-2004-x64
3normalfordelte.jpg
windows7-x64
3normalfordelte.jpg
windows10-2004-x64
4Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
49b298624de14b573163b90397130419.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
49b298624de14b573163b90397130419.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Ekspositionsdelen.afd
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Ekspositionsdelen.afd
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Festmaaltidet.bas
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Festmaaltidet.bas
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Unrhymed.adi
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Unrhymed.adi
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
apotekerbevillings.jpg
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
apotekerbevillings.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
christianshavnerne.deh
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
christianshavnerne.deh
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
claudius.jpg
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
claudius.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
lumpenhedernes/stoppegarns.bra
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
lumpenhedernes/stoppegarns.bra
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
normalfordelte.jpg
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
normalfordelte.jpg
Resource
win10v2004-20250217-en
General
-
Target
lumpenhedernes/stoppegarns.bra
-
Size
479KB
-
MD5
454bfa40f950359c0c5fedfce885db5d
-
SHA1
3fcd8ae2afc5d784a1759315b9e1744e9873e950
-
SHA256
92cb9a933f564e207a2f8a9387dc6f4852a5aa53ac6c95120fe77d3b684ca3a4
-
SHA512
4a8b956fbf7072b676f6a8526d6f909a7d6f43c4f67c7aea12e275799b42b78e8500a7caa5387eff5607d90d578210c6fc230238b6b95401392115a0aa49dbea
-
SSDEEP
1536:Iwj7QkU4Succftrx4E1tOkzEF62k8SPnkxFDhTB7FTIo:IIQkHCcfkCxYFLk8S6FBxJ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2832 AcroRd32.exe 2832 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2464 2064 cmd.exe 31 PID 2064 wrote to memory of 2464 2064 cmd.exe 31 PID 2064 wrote to memory of 2464 2064 cmd.exe 31 PID 2464 wrote to memory of 2832 2464 rundll32.exe 32 PID 2464 wrote to memory of 2832 2464 rundll32.exe 32 PID 2464 wrote to memory of 2832 2464 rundll32.exe 32 PID 2464 wrote to memory of 2832 2464 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\lumpenhedernes\stoppegarns.bra1⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\lumpenhedernes\stoppegarns.bra2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\lumpenhedernes\stoppegarns.bra"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD505e3eb9048cbe1a9a8445cfd45895a92
SHA107127c5adc9909e79545fae7c3fa69f57482a2d1
SHA256943b29f3ce7cfd90bcc61b9b7cfbbd2800628e22a312f2be649862415d50c550
SHA5127cce0b6a0e1bc2bb686ce44aa79b69ba77343ebe50fe62f0f638e0a38e762dc0984055f218eba4f6067cc1f3c939dc9dc2a8c530e2cadcc9aa5877c10972a6a2