Overview
overview
6Static
static
1✅stripe ...v3.rar
windows7-x64
3✅stripe ...v3.rar
windows10-2004-x64
3v3/mohoe.py
windows7-x64
3v3/mohoe.py
windows10-2004-x64
3v3/registe...ain.py
windows7-x64
3v3/registe...ain.py
windows10-2004-x64
3v3/registe...to.mp4
windows7-x64
1v3/registe...to.mp4
windows10-2004-x64
6Analysis
-
max time kernel
56s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31/08/2023, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
✅stripe any page bypass cvv tool✅v3.rar
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
✅stripe any page bypass cvv tool✅v3.rar
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
v3/mohoe.py
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
v3/mohoe.py
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
v3/registerlogin/main.py
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
v3/registerlogin/main.py
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
v3/registerlogin/site/mojito.mp4
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
v3/registerlogin/site/mojito.mp4
Resource
win10v2004-20230703-en
General
-
Target
v3/mohoe.py
-
Size
40KB
-
MD5
3b6624afda561c10c979d2346780a8fc
-
SHA1
87760149075732e66cb9ea5d0cf215a230b2622a
-
SHA256
322975c28e3abfe66fe5cfb71841c027b649bff3da938ce3b687fc06ea9a71ff
-
SHA512
234557d6133d54b5f079356902ba3ca1741a9f39d07af5b923751e160460f5cc7a928a82be52ba13d6d308ceb934de7c63df8fa0bb09d1590a0f3d54cd1f912e
-
SSDEEP
384:zcCUNZ5HargTED6WtpggASQNBdA3GoNZIZKWloK/fUm2ryU1IqYxVlQ35lJZ8kjJ:z5tpDyKyS5p7sQRyy7z6WCVL+d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3032 AcroRd32.exe 3032 AcroRd32.exe 3032 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2852 3068 cmd.exe 29 PID 3068 wrote to memory of 2852 3068 cmd.exe 29 PID 3068 wrote to memory of 2852 3068 cmd.exe 29 PID 2852 wrote to memory of 3032 2852 rundll32.exe 30 PID 2852 wrote to memory of 3032 2852 rundll32.exe 30 PID 2852 wrote to memory of 3032 2852 rundll32.exe 30 PID 2852 wrote to memory of 3032 2852 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\v3\mohoe.py1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\v3\mohoe.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\v3\mohoe.py"3⤵
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD568f3f700070fb7fe0ed1294dc5ead9a8
SHA1479424f74c19ae48a71bf53c63282370bd9cfe01
SHA25641b784d76f4367b5145b489cc7412bbeaf3d4a4dfd6ba3a28afaf5b9e132d6a4
SHA512b11e6e39d487ef831549d5d31d921906dbc37c142f124f29e22823301574defa2514938df030fb8a8667a5a241387742676673899acca9f915472da8fabee295