Overview
overview
3Static
static
3exe.win-am...it.vbs
windows7-x64
1exe.win-am...it.vbs
windows10-2004-x64
1exe.win-am...ox.vbs
windows7-x64
1exe.win-am...ox.vbs
windows10-2004-x64
1exe.win-am...et.vbs
windows7-x64
1exe.win-am...et.vbs
windows10-2004-x64
1exe.win-am...te.vbs
windows7-x64
1exe.win-am...te.vbs
windows10-2004-x64
1exe.win-am...tk.vbs
windows7-x64
1exe.win-am...tk.vbs
windows10-2004-x64
1exe.win-am...ox.vbs
windows7-x64
1exe.win-am...ox.vbs
windows10-2004-x64
1exe.win-am...xt.vbs
windows7-x64
1exe.win-am...xt.vbs
windows10-2004-x64
1exe.win-am...tk.vbs
windows7-x64
1exe.win-am...tk.vbs
windows10-2004-x64
1exe.win-am...ox.vbs
windows7-x64
1exe.win-am...ox.vbs
windows10-2004-x64
1exe.win-am...rs.vbs
windows7-x64
1exe.win-am...rs.vbs
windows10-2004-x64
1exe.win-am...ew.vbs
windows7-x64
1exe.win-am...ew.vbs
windows10-2004-x64
1exe.win-am...tk.vbs
windows7-x64
1exe.win-am...tk.vbs
windows10-2004-x64
1exe.win-am...e.html
windows7-x64
1exe.win-am...e.html
windows10-2004-x64
1exe.win-am...__.pyc
windows7-x64
3exe.win-am...__.pyc
windows10-2004-x64
3exe.win-am...ll.dll
windows7-x64
1exe.win-am...ll.dll
windows10-2004-x64
1exe.win-am...on.pyc
windows7-x64
3exe.win-am...on.pyc
windows10-2004-x64
3Analysis
-
max time kernel
155s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
30-08-2023 16:42
Static task
static1
Behavioral task
behavioral1
Sample
exe.win-amd64-3.11/lib/tcl8.6/init.vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
exe.win-amd64-3.11/lib/tcl8.6/init.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
exe.win-amd64-3.11/lib/tk8.6/listbox.vbs
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
exe.win-amd64-3.11/lib/tk8.6/listbox.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
exe.win-amd64-3.11/lib/tk8.6/megawidget.vbs
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
exe.win-amd64-3.11/lib/tk8.6/megawidget.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
exe.win-amd64-3.11/lib/tk8.6/palette.vbs
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
exe.win-amd64-3.11/lib/tk8.6/palette.vbs
Resource
win10v2004-20230824-en
Behavioral task
behavioral9
Sample
exe.win-amd64-3.11/lib/tk8.6/safetk.vbs
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
exe.win-amd64-3.11/lib/tk8.6/safetk.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
exe.win-amd64-3.11/lib/tk8.6/spinbox.vbs
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
exe.win-amd64-3.11/lib/tk8.6/spinbox.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
exe.win-amd64-3.11/lib/tk8.6/text.vbs
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
exe.win-amd64-3.11/lib/tk8.6/text.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
exe.win-amd64-3.11/lib/tk8.6/tk.vbs
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
exe.win-amd64-3.11/lib/tk8.6/tk.vbs
Resource
win10v2004-20230824-en
Behavioral task
behavioral17
Sample
exe.win-amd64-3.11/lib/tk8.6/tkfbox.vbs
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
exe.win-amd64-3.11/lib/tk8.6/tkfbox.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
exe.win-amd64-3.11/lib/tk8.6/ttk/cursors.vbs
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
exe.win-amd64-3.11/lib/tk8.6/ttk/cursors.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
exe.win-amd64-3.11/lib/tk8.6/ttk/treeview.vbs
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
exe.win-amd64-3.11/lib/tk8.6/ttk/treeview.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
exe.win-amd64-3.11/lib/tk8.6/ttk/ttk.vbs
Resource
win7-20230824-en
Behavioral task
behavioral24
Sample
exe.win-amd64-3.11/lib/tk8.6/ttk/ttk.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
exe.win-amd64-3.11/lib/win32com/readme.html
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
exe.win-amd64-3.11/lib/win32com/readme.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
exe.win-amd64-3.11/lib/win32com/shell/__init__.pyc
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
exe.win-amd64-3.11/lib/win32com/shell/__init__.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral29
Sample
exe.win-amd64-3.11/lib/win32com/shell/shell.dll
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
exe.win-amd64-3.11/lib/win32com/shell/shell.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral31
Sample
exe.win-amd64-3.11/lib/win32com/shell/shellcon.pyc
Resource
win7-20230824-en
Behavioral task
behavioral32
Sample
exe.win-amd64-3.11/lib/win32com/shell/shellcon.pyc
Resource
win10v2004-20230703-en
General
-
Target
exe.win-amd64-3.11/lib/win32com/shell/__init__.pyc
-
Size
326B
-
MD5
3f4fed14db984c523b2ae660574673c3
-
SHA1
c7dcb3b624d296f403a5f1a5ce8e49e392dddd32
-
SHA256
755747b8ee380a8286fdd11b3f2252e918c9ad8beb04af508bdbea2bf15e6964
-
SHA512
5cb6adcd8d506b8783e3bd7bd7ed16e85fd93ce215487bb086020f99cd89fa1a06353f991c16295a1ebeace4db6362c7cb8df79a95432a96d239462a9e737603
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2500 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2500 AcroRd32.exe 2500 AcroRd32.exe 2500 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2656 1896 cmd.exe 29 PID 1896 wrote to memory of 2656 1896 cmd.exe 29 PID 1896 wrote to memory of 2656 1896 cmd.exe 29 PID 2656 wrote to memory of 2500 2656 rundll32.exe 30 PID 2656 wrote to memory of 2500 2656 rundll32.exe 30 PID 2656 wrote to memory of 2500 2656 rundll32.exe 30 PID 2656 wrote to memory of 2500 2656 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\exe.win-amd64-3.11\lib\win32com\shell\__init__.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\exe.win-amd64-3.11\lib\win32com\shell\__init__.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\exe.win-amd64-3.11\lib\win32com\shell\__init__.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56d77caae049c6f42d6bdafe19a74f1b0
SHA1d59cba65fb4c2d233c389e27a3ae608d5e8a210a
SHA256f08b9de89022e4450f7ef2a5545b5ec0bf58dc1f76465bbcfed06710152b7d83
SHA5123c8143f73a75aafc6d790713f00b210bf9b0b1c9be2a1a2be33e7db92d953a1ff591248a836edd549f3903f9d035f153c2aa59309312f93fd12c07b103b88f26