Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/08/2023, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
main.py
Resource
win7-20230712-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
main.py
Resource
win10v2004-20230703-en
4 signatures
150 seconds
General
-
Target
main.py
-
Size
896B
-
MD5
c8d04c340bf71d5366068e6ecbdd8643
-
SHA1
6455cad6ac7c0f6f464aaec83159257cf3e60bd6
-
SHA256
7ee97954023af4543aa33b401a786fcb18773a68842df7ad828137a2715fb6fa
-
SHA512
cc9cd548022baa86d8473e18267067858b8b29fe17a13e61dcd4b8ce77f76a58b4795e0f0b0588258be771ceb6ced71508080079b50c60ee3cdefb944544845c
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2908 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2908 2572 cmd.exe 29 PID 2572 wrote to memory of 2908 2572 cmd.exe 29 PID 2572 wrote to memory of 2908 2572 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.py1⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2908
-