Overview
overview
10Static
static
349b298624d...19.exe
windows7-x64
1049b298624d...19.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Ekspositionsdelen.afd
windows7-x64
3Ekspositionsdelen.afd
windows10-2004-x64
3Festmaaltidet.bas
windows7-x64
3Festmaaltidet.bas
windows10-2004-x64
3Unrhymed.adi
windows7-x64
3Unrhymed.adi
windows10-2004-x64
3apotekerbe...gs.jpg
windows7-x64
3apotekerbe...gs.jpg
windows10-2004-x64
4christians...ne.deh
windows7-x64
3christians...ne.deh
windows10-2004-x64
3claudius.jpg
windows7-x64
3claudius.jpg
windows10-2004-x64
4lumpenhede...ns.bra
windows7-x64
3lumpenhede...ns.bra
windows10-2004-x64
3normalfordelte.jpg
windows7-x64
3normalfordelte.jpg
windows10-2004-x64
4Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
49b298624de14b573163b90397130419.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
49b298624de14b573163b90397130419.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Ekspositionsdelen.afd
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Ekspositionsdelen.afd
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Festmaaltidet.bas
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Festmaaltidet.bas
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Unrhymed.adi
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Unrhymed.adi
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
apotekerbevillings.jpg
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
apotekerbevillings.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
christianshavnerne.deh
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
christianshavnerne.deh
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
claudius.jpg
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
claudius.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
lumpenhedernes/stoppegarns.bra
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
lumpenhedernes/stoppegarns.bra
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
normalfordelte.jpg
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
normalfordelte.jpg
Resource
win10v2004-20250217-en
General
-
Target
Ekspositionsdelen.afd
-
Size
115KB
-
MD5
22fb834736ef02494e99f71ba7222f69
-
SHA1
ad6a98d680a72a823b5b175a45f46a8b96b7b7ca
-
SHA256
7bf5c0010b6e023c90e5896266b53b84b06e8819ca3e17c78024f2a820164c13
-
SHA512
76de9f0a84157ac194833dc451f000bbe483274cae995a71474bdf636e20ae19eeb6d12081d122b7f7c7cd6bc3e225ef3642f944268a764fe0f6dbd6302a88b0
-
SSDEEP
3072:PfBZ+bT8joyfvU9lEERRZu+WYY4iUot91:PZI/yZ2l5n4PJHUe91
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2788 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2788 AcroRd32.exe 2788 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2276 2340 cmd.exe 31 PID 2340 wrote to memory of 2276 2340 cmd.exe 31 PID 2340 wrote to memory of 2276 2340 cmd.exe 31 PID 2276 wrote to memory of 2788 2276 rundll32.exe 33 PID 2276 wrote to memory of 2788 2276 rundll32.exe 33 PID 2276 wrote to memory of 2788 2276 rundll32.exe 33 PID 2276 wrote to memory of 2788 2276 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Ekspositionsdelen.afd1⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Ekspositionsdelen.afd2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Ekspositionsdelen.afd"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD560f58a4c4b88dd41003450b83a7be11a
SHA134b4a3853844eca4730a2366142027254b8dc474
SHA25686faafc65da37d80e05ca3e1ce2ea02cc61d71af7a830b8c35da27171f432b46
SHA512628d7a6e67003e1fbdc470d1cad56cd5e4524978d1a91ebf791abcb94223d579da8280ec61f30acb606455ac7b3c4c4fbe76a63d812b8333f43110ba0956c2cb