Analysis
-
max time kernel
33s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03-10-2023 10:05
Behavioral task
behavioral1
Sample
edu.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
edu.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
edu.pyc
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
edu.pyc
Resource
win10v2004-20230915-en
General
-
Target
edu.pyc
-
Size
4KB
-
MD5
76d4d94a755ac7f57bfe4e6cc9a06522
-
SHA1
a52bf74ad569865c080d770330a65dbe982fdaf7
-
SHA256
205a79ba9607617f17f29b0dd2bf46950edff05935b44091f6b66675d74e0b77
-
SHA512
ccfb2dcb99f8ce9cd5dfbe07f6a6d53854a5a868f315fbc1a2e2b7ce1d29a9007b33cdf7f503f08aa1620ca51e3d67c825ec2d2966484ed2feeed66b2f1b818d
-
SSDEEP
96:nXHYeaFliUhgHA55ESoSFcIPtHF6FZvyFNpyaOd:nXHYeaFliCGSoSaCMFZvyHp/Od
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2660 AcroRd32.exe 2660 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2768 2104 cmd.exe 29 PID 2104 wrote to memory of 2768 2104 cmd.exe 29 PID 2104 wrote to memory of 2768 2104 cmd.exe 29 PID 2768 wrote to memory of 2660 2768 rundll32.exe 30 PID 2768 wrote to memory of 2660 2768 rundll32.exe 30 PID 2768 wrote to memory of 2660 2768 rundll32.exe 30 PID 2768 wrote to memory of 2660 2768 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\edu.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\edu.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\edu.pyc"3⤵
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD582b5df28e859134b218107b2319698cd
SHA16482af9d6f3756c8542e2d2d0c1a7c9be0ceef2c
SHA256695fcacbdeebd8e06be3bc248482e818cd33c063223241d815ebc21cddf23b9d
SHA512068b04247b050d6e6faa3be108f0269440a483da223fba8c649f621cc6813bee80499f738c525384dd09888b89d91c47cb9c3d0ea23cdcbc34ab5d9530a538f9