Overview
overview
10Static
static
349b298624d...19.exe
windows7-x64
1049b298624d...19.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Ekspositionsdelen.afd
windows7-x64
3Ekspositionsdelen.afd
windows10-2004-x64
3Festmaaltidet.bas
windows7-x64
3Festmaaltidet.bas
windows10-2004-x64
3Unrhymed.adi
windows7-x64
3Unrhymed.adi
windows10-2004-x64
3apotekerbe...gs.jpg
windows7-x64
3apotekerbe...gs.jpg
windows10-2004-x64
4christians...ne.deh
windows7-x64
3christians...ne.deh
windows10-2004-x64
3claudius.jpg
windows7-x64
3claudius.jpg
windows10-2004-x64
4lumpenhede...ns.bra
windows7-x64
3lumpenhede...ns.bra
windows10-2004-x64
3normalfordelte.jpg
windows7-x64
3normalfordelte.jpg
windows10-2004-x64
4Analysis
-
max time kernel
103s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
49b298624de14b573163b90397130419.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
49b298624de14b573163b90397130419.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Ekspositionsdelen.afd
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Ekspositionsdelen.afd
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Festmaaltidet.bas
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Festmaaltidet.bas
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Unrhymed.adi
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Unrhymed.adi
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
apotekerbevillings.jpg
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
apotekerbevillings.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
christianshavnerne.deh
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
christianshavnerne.deh
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
claudius.jpg
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
claudius.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
lumpenhedernes/stoppegarns.bra
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
lumpenhedernes/stoppegarns.bra
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
normalfordelte.jpg
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
normalfordelte.jpg
Resource
win10v2004-20250217-en
General
-
Target
Unrhymed.adi
-
Size
92KB
-
MD5
4e17cfae8be669dc88bb9343f971862b
-
SHA1
642ea7d1c06f438146d2df1b132ac7e85a261917
-
SHA256
25615665769858efd92342269955c6acd095520d8fe5b5fb1633d28ed92cd840
-
SHA512
7209c60bd74062f9e689a8389f671c0e0b531b764858957c5724ae548e28a163809b5a7b998d680250afd84d1bc28414ead65d12d8d352cf4d4b0e9e4bac2237
-
SSDEEP
768:RtbjIxO6JaLTYpLJL8Ku9ytaVXzM3gdDENCc2wqlx9:z6gLTIgt9Krox9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2060 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2060 AcroRd32.exe 2060 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2104 1996 cmd.exe 30 PID 1996 wrote to memory of 2104 1996 cmd.exe 30 PID 1996 wrote to memory of 2104 1996 cmd.exe 30 PID 2104 wrote to memory of 2060 2104 rundll32.exe 31 PID 2104 wrote to memory of 2060 2104 rundll32.exe 31 PID 2104 wrote to memory of 2060 2104 rundll32.exe 31 PID 2104 wrote to memory of 2060 2104 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Unrhymed.adi1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Unrhymed.adi2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Unrhymed.adi"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a209e45558e4dbd2b6b1b8a97ea3c3b6
SHA1476582ca8852ccaeb4d34abf67b5cc6b514f3e13
SHA256e68fd2d7b42fd0a9268ac991aa5a644bb50efa208f38620877983f1e6a2027bf
SHA512195106e1dfd26ad6891cab873e642d257afdf6203bc7218007271bf0b84884963e508f60c3f8fa670ef2440f06ce4727ccf0c9fadcc0c3ba926b2a7aba31c12a