Resubmissions
11-08-2023 18:09
230811-wrxmsshg7w 1010-08-2023 16:39
230810-t6a18sfb25 310-08-2023 16:00
230810-tfl1taef87 1010-08-2023 15:59
230810-te451agd9w 310-08-2023 15:56
230810-tdfe9aef62 10Analysis
-
max time kernel
843s -
max time network
848s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
11-08-2023 18:09
Behavioral task
behavioral1
Sample
2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
shellcode_loader_1.pyc
Resource
win7-20230712-en
General
-
Target
shellcode_loader_1.pyc
-
Size
16KB
-
MD5
2ecdeddd4dd58e971a25977e6380b69c
-
SHA1
3aa8c158f7642e234a1c85b8a710afcc323fafee
-
SHA256
c9ec7a340b75ef9afb510c57450b64c40c5bf4c3bbb8e6a4e3a2668a6dc52e1b
-
SHA512
d26e265dfa0c87c5b276098005bf4659fe2725d57aaeae07882ede3eb345af7a1eb68561fe3ec7afd873564cfe153d3dd85484ed062db8bb45102e416d868256
-
SSDEEP
384:gbDIWXhBbgX5X9Ck4bwBFJlun16vnsNZKljWhhh:CKZvD4hh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2904 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 2904 AcroRd32.exe 2904 AcroRd32.exe 2904 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2588 wrote to memory of 2428 2588 cmd.exe rundll32.exe PID 2588 wrote to memory of 2428 2588 cmd.exe rundll32.exe PID 2588 wrote to memory of 2428 2588 cmd.exe rundll32.exe PID 2428 wrote to memory of 2904 2428 rundll32.exe AcroRd32.exe PID 2428 wrote to memory of 2904 2428 rundll32.exe AcroRd32.exe PID 2428 wrote to memory of 2904 2428 rundll32.exe AcroRd32.exe PID 2428 wrote to memory of 2904 2428 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\shellcode_loader_1.pyc1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\shellcode_loader_1.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\shellcode_loader_1.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEventsFilesize
3KB
MD52b7587ba7475f22d8c77dec27250983a
SHA1ccca8d71e008626839154c01a76624809ccdc11d
SHA256d59c93214fd6870f9c2dcd8bd4a22e5ca62a87f1401bad59c3c4aeb61dc9d6da
SHA512ec85b3bdf532346daebf46a596045d6255d1318ac4f59ef13787ac4776d67132f62f309a1b035edbdf7bc6dadc27b851e0ff04e33684b54ef51ad2a05e913f1f