Resubmissions
11-08-2023 18:09
230811-wrxmsshg7w 1010-08-2023 16:39
230810-t6a18sfb25 310-08-2023 16:00
230810-tfl1taef87 1010-08-2023 15:59
230810-te451agd9w 310-08-2023 15:56
230810-tdfe9aef62 10Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
10-08-2023 16:00
Behavioral task
behavioral1
Sample
2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
shellcode_loader_1.pyc
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
shellcode_loader_1.pyc
Resource
win10v2004-20230703-en
General
-
Target
shellcode_loader_1.pyc
-
Size
16KB
-
MD5
2ecdeddd4dd58e971a25977e6380b69c
-
SHA1
3aa8c158f7642e234a1c85b8a710afcc323fafee
-
SHA256
c9ec7a340b75ef9afb510c57450b64c40c5bf4c3bbb8e6a4e3a2668a6dc52e1b
-
SHA512
d26e265dfa0c87c5b276098005bf4659fe2725d57aaeae07882ede3eb345af7a1eb68561fe3ec7afd873564cfe153d3dd85484ed062db8bb45102e416d868256
-
SSDEEP
384:gbDIWXhBbgX5X9Ck4bwBFJlun16vnsNZKljWhhh:CKZvD4hh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\pyc_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2952 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 2952 AcroRd32.exe 2952 AcroRd32.exe 2952 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2420 wrote to memory of 288 2420 cmd.exe rundll32.exe PID 2420 wrote to memory of 288 2420 cmd.exe rundll32.exe PID 2420 wrote to memory of 288 2420 cmd.exe rundll32.exe PID 288 wrote to memory of 2952 288 rundll32.exe AcroRd32.exe PID 288 wrote to memory of 2952 288 rundll32.exe AcroRd32.exe PID 288 wrote to memory of 2952 288 rundll32.exe AcroRd32.exe PID 288 wrote to memory of 2952 288 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\shellcode_loader_1.pyc1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\shellcode_loader_1.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\shellcode_loader_1.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEventsFilesize
3KB
MD53505f6345cbbc7fc4a254902f8a804fa
SHA16a3fb26cdd7ba47b024e2711c8b8cc9aecfbf42a
SHA256435427e6938c112ed56e8897df70a9cb001ec5ed1de9fdf2ea2d569b04bbc853
SHA512e29adab15aebe0abf2cb046df1a834bd8021cff64a95f3021c51c4f4d4a31da0611b813800b627c3970be1a2518a9d467287ecac7c305ca80f0949f5cab6ba4f