Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/04/2023, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
main.py
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
main.py
Resource
win10v2004-20230221-en
8 signatures
150 seconds
General
-
Target
main.py
-
Size
18B
-
MD5
810e41ed55970f11d71f3d21e37a93ed
-
SHA1
f30abd830593dbc9149fbe878ffd9309fb44e318
-
SHA256
558ce2692e371f50b90e54a1a98ee07d07fe9335a677651d30b7351201d7b9d1
-
SHA512
902096970daf15606f32c10c2d7d2ffb4e288e15a0761a4ce18c269df099d31681dbd823fe97ca06da4c24a7e46ff62c34385b372b37b711b3b2fedcd1f664d0
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 528 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1724 wrote to memory of 528 1724 cmd.exe 29 PID 1724 wrote to memory of 528 1724 cmd.exe 29 PID 1724 wrote to memory of 528 1724 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.py1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:528
-