Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/08/2023, 01:31
Behavioral task
behavioral1
Sample
bruteforce.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
bruteforce.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
bruteforce.pyc
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
bruteforce.pyc
Resource
win10v2004-20230703-en
General
-
Target
bruteforce.pyc
-
Size
8KB
-
MD5
4e36132a9c3206b11b36a622f4ecc699
-
SHA1
3d72312d19f9fee1cddf6c3526806a8255cb305f
-
SHA256
443ddc1a682c6a08c5269f47c49a7fd7834276ee19c7271daac9aeaad2e42395
-
SHA512
0415c02fd53071cd884f186e1a57b6295462cba9d36790abf28aebe30ed25e76400d4392c0f8613138b77da76e77ace8bf7391b9de2527a35f0bdf3f77c3ea50
-
SSDEEP
192:mleBfu/Jg8xPAxzfDYDdw6p7pOt+izzcFQCk3c:PhuRg8CxdSpu+GguCk3c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.pyc rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2972 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2972 AcroRd32.exe 2972 AcroRd32.exe 2972 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2968 2996 cmd.exe 29 PID 2996 wrote to memory of 2968 2996 cmd.exe 29 PID 2996 wrote to memory of 2968 2996 cmd.exe 29 PID 2968 wrote to memory of 2972 2968 rundll32.exe 30 PID 2968 wrote to memory of 2972 2968 rundll32.exe 30 PID 2968 wrote to memory of 2972 2968 rundll32.exe 30 PID 2968 wrote to memory of 2972 2968 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bruteforce.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bruteforce.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bruteforce.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD570be5bafe3e3df9a4be110c80cb663be
SHA16a46b98a1047db418b77bd8847d87cc78cbd75ea
SHA2567ade3dbb70968391581a8e80b37f8be9869a2ff1b429b6849c85e071543b611a
SHA512cd9197843e5cb70700bc62cef5dac43de391f41f7c4b8d84c8abc823972af69c374958e9a42818439391788a2e01f8467d3a8a60084cd26f3c98d4942af1eb39