Analysis

  • max time kernel
    216s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07/10/2023, 23:50

General

  • Target

    usr/lib/python3.11/site-packages/ansible_collections/__pycache__/ansible_community.cpython-311.pyc

  • Size

    969B

  • MD5

    785bd1ce5587d043570465fe9eb67378

  • SHA1

    ec049e79e9e953538be11efbe8f7e6699c7d5157

  • SHA256

    9d49378cef3a4c784d3c76399016ea0af6e537edddaa9899cd2c3cf5a38f1705

  • SHA512

    9ad526c31968c941b5a88eb2abad8aa9d04d849cc491db098274cf12b7a8279d7b2723fffeb344bb65887278ac711acd6f2e850e20351918e7a5eed746f6ba26

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\__pycache__\ansible_community.cpython-311.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\__pycache__\ansible_community.cpython-311.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\__pycache__\ansible_community.cpython-311.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d4c358a0a9127cde60a5efe1a8ce0823

    SHA1

    0c24a79f58607d8921db388ade6ec8a27a66f67f

    SHA256

    73feb47ab959f7a036a1d2e88c352ac708dca7ccae213715189de283f072a5cb

    SHA512

    9bacd0b87210733c8d6017cfd1f34505574b76988bd91c10836ab02469854e8312b8f38ba3f611073eed0e5151df8c1cace6f90794cc6cefb8d464799caafe20