Overview
overview
3Static
static
1bloxflip.p...unt.py
windows7-x64
3bloxflip.p...unt.py
windows10-2004-x64
3bloxflip.p...ent.py
windows7-x64
3bloxflip.p...ent.py
windows10-2004-x64
3bloxflip.p...ash.py
windows7-x64
3bloxflip.p...ash.py
windows10-2004-x64
3bloxflip.p...pot.py
windows7-x64
3bloxflip.p...pot.py
windows10-2004-x64
3bloxflip.p...ine.py
windows7-x64
3bloxflip.p...ine.py
windows10-2004-x64
3bloxflip.p...ors.py
windows7-x64
3bloxflip.p...ors.py
windows10-2004-x64
3bloxflip.p...est.py
windows7-x64
3bloxflip.p...est.py
windows10-2004-x64
3Analysis
-
max time kernel
110s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25/08/2023, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
bloxflip.py-main/bloxflip/account.py
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
bloxflip.py-main/bloxflip/account.py
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
bloxflip.py-main/bloxflip/client.py
Resource
win7-20230824-en
Behavioral task
behavioral4
Sample
bloxflip.py-main/bloxflip/client.py
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
bloxflip.py-main/bloxflip/crash.py
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
bloxflip.py-main/bloxflip/crash.py
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
bloxflip.py-main/bloxflip/jackpot.py
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
bloxflip.py-main/bloxflip/jackpot.py
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
bloxflip.py-main/bloxflip/mine.py
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
bloxflip.py-main/bloxflip/mine.py
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
bloxflip.py-main/bloxflip/utilities/errors.py
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
bloxflip.py-main/bloxflip/utilities/errors.py
Resource
win10v2004-20230824-en
Behavioral task
behavioral13
Sample
bloxflip.py-main/test.py
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
bloxflip.py-main/test.py
Resource
win10v2004-20230703-en
General
-
Target
bloxflip.py-main/bloxflip/crash.py
-
Size
358B
-
MD5
edf12850dd970c7928620336e9ff5514
-
SHA1
b66273193ff27cc5056a59c6b9ca0f34e11625f3
-
SHA256
c85fb1ccdc5e44d473870d5515d0ccbe51d56848d62ab8e238072f1be8923158
-
SHA512
716097142031ccc577b45231ed47bd99dadd0120a71fc6df0071570078099f5d9d1cb4a129967292129ffe2bbeb506e94366790d834b15b215444954c7a052eb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2936 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2936 AcroRd32.exe 2936 AcroRd32.exe 2936 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1372 1712 cmd.exe 29 PID 1712 wrote to memory of 1372 1712 cmd.exe 29 PID 1712 wrote to memory of 1372 1712 cmd.exe 29 PID 1372 wrote to memory of 2936 1372 rundll32.exe 30 PID 1372 wrote to memory of 2936 1372 rundll32.exe 30 PID 1372 wrote to memory of 2936 1372 rundll32.exe 30 PID 1372 wrote to memory of 2936 1372 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bloxflip.py-main\bloxflip\crash.py1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bloxflip.py-main\bloxflip\crash.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bloxflip.py-main\bloxflip\crash.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e533d6d48b23b7a42b70c5aca182a36c
SHA14140860e10784b465e37686cb4a67df773008c32
SHA2562e99b2994a3d939619a6f4f7b91c05800a766b7a29ba08c9973fd9a95227f57a
SHA512dcd5ab3e1c6c55b651e4d01478cc9fb08884090b767c5da55055d2092d9962fbc2310323077f0cc5f4e5c0d15932eab71e1dfd9a391fbbbbac395bc9a1faea25