Analysis

  • max time kernel
    116s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2023, 20:38

General

  • Target

    bloxflip.py-main/bloxflip/jackpot.py

  • Size

    714B

  • MD5

    fa7cdf4d756e90878f22da443af31591

  • SHA1

    019dd547c15ecc0c0cce6649328cb185ed43c5f6

  • SHA256

    5ee1a0b6e09daf20f2f06b9cc39bf4a941f00030a3a5cc1bb2d1b20368f61e3f

  • SHA512

    7589009312e88cf733c904373168332f492ecd4121e044150078552e9e0d55ffa76bb934413238d7dfae134f0b8bff688a7c61b92b703b3fffb0dcfdd822fb3e

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\bloxflip.py-main\bloxflip\jackpot.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bloxflip.py-main\bloxflip\jackpot.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bloxflip.py-main\bloxflip\jackpot.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2920

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          9f560890111b08088e606b74d75d6629

          SHA1

          8049314eda8bbe1328acbfed2017acd9faa7d375

          SHA256

          0879f7aa2677210ef005e64e309610afabcf1cc094fb48b6b7b13f96c3216e5b

          SHA512

          445ff63e2738e60e9789961419cb6864d4129a9550fa4e08741d6216d6de06b7e5c059e539dc1a490dab7eb126b84f2f2b729259c1051cd00aff3093cc7b7457