Analysis
-
max time kernel
26s -
max time network
14s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-06-2023 08:59
Static task
static1
Behavioral task
behavioral1
Sample
TEST.py
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
TEST.py
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
TEST.py
-
Size
41B
-
MD5
44757e4b69c710dc5ad8427c0383238e
-
SHA1
c88621f40f30a78e554face940efeb0d25ce6fdd
-
SHA256
0bd80872e1caac67d2fe2d648c6907d244655dd7a2da5286a53fa5e09ff0e6ec
-
SHA512
63da0c8b6145c9c5aac2dbb415db45480ee58c56018fd38bbe9960d345edcaf1752f334c430ea853ad3d724cd84c6f4a9d8665fcd2bfb2b05d2909597775bc3d
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1576 AcroRd32.exe 1576 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1920 wrote to memory of 584 1920 cmd.exe 28 PID 1920 wrote to memory of 584 1920 cmd.exe 28 PID 1920 wrote to memory of 584 1920 cmd.exe 28 PID 584 wrote to memory of 1576 584 rundll32.exe 29 PID 584 wrote to memory of 1576 584 rundll32.exe 29 PID 584 wrote to memory of 1576 584 rundll32.exe 29 PID 584 wrote to memory of 1576 584 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TEST.py1⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TEST.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TEST.py"3⤵
- Suspicious use of SetWindowsHookEx
PID:1576
-
-