Analysis
-
max time kernel
153s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
17-11-2021 07:30
Static task
static1
Behavioral task
behavioral1
Sample
.d.tar/boner
Resource
ubuntu1804-amd64-en-20211025
Behavioral task
behavioral2
Sample
.d.tar/cosynus
Resource
ubuntu1804-amd64-en-20211025
Behavioral task
behavioral3
Sample
.d.tar/main
Resource
ubuntu1804-amd64-en-20211025
Behavioral task
behavioral4
Sample
.d.tar/main
Resource
debian9-mipsel-en-20211025
Behavioral task
behavioral5
Sample
.d.tar/main
Resource
debian9-mipsbe-en-20211025
Behavioral task
behavioral6
Sample
.d.tar/main
Resource
debian9-armhf-en-20211025
Behavioral task
behavioral7
Sample
.d.tar/send_vuln.py
Resource
win7-en-20211014
Behavioral task
behavioral8
Sample
.d.tar/send_vuln.py
Resource
win10-en-20211014
General
-
Target
.d.tar/send_vuln.py
-
Size
1KB
-
MD5
dbb01b6d40b0efa19bd887640685e3b6
-
SHA1
638108b2217b21843ba7f1c80a95f756e5e2310d
-
SHA256
6988f670c3cee552792797e7f0aea6e93516bf278b29d3ddce13cedb6c261f3b
-
SHA512
89149ce817b1c19c531c08e53aabe3964148ac24ccfbb56d323d3255db64f42f93ce4e0b213d996c6d84d4bb5f6930a74d3cccb9f467acbe86077071ab6ca03b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1808 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1808 AcroRd32.exe 1808 AcroRd32.exe 1808 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 748 wrote to memory of 1864 748 cmd.exe 29 PID 748 wrote to memory of 1864 748 cmd.exe 29 PID 748 wrote to memory of 1864 748 cmd.exe 29 PID 1864 wrote to memory of 1808 1864 rundll32.exe 30 PID 1864 wrote to memory of 1808 1864 rundll32.exe 30 PID 1864 wrote to memory of 1808 1864 rundll32.exe 30 PID 1864 wrote to memory of 1808 1864 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\.d.tar\send_vuln.py1⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\.d.tar\send_vuln.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\.d.tar\send_vuln.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1808
-
-