Analysis

  • max time kernel
    156s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07/10/2023, 23:54

General

  • Target

    usr/lib/python3.11/site-packages/ansible_collections/amazon/aws/plugins/action/__pycache__/s3_object.cpython-311.pyc

  • Size

    3KB

  • MD5

    93af76b1998384d1ffd350791eec050d

  • SHA1

    6c73d252ff5b5f7ae7faae16cbb4559891d62212

  • SHA256

    f7d291b144ebf92479cf8fcd0729c95aefdb449774eee8f470c002560312f411

  • SHA512

    fffce082fe591a468a36be83ddbc5044c0513328b7edf319cc2f538de1a51ae301a57e2560f99e3ad01f47359d10b98dced467a6b8ea695da97a7932dc93ecbc

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\amazon\aws\plugins\action\__pycache__\s3_object.cpython-311.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\amazon\aws\plugins\action\__pycache__\s3_object.cpython-311.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\amazon\aws\plugins\action\__pycache__\s3_object.cpython-311.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7b7e54a08165bb4ff94ddb730e75b6b5

    SHA1

    50555c4d3c37cd17c04e5915f89e66110988cfa1

    SHA256

    b2bb7e29858ada2d03722c6c72e34c6208164cc11c7ddf721fd2fe607dca3f19

    SHA512

    9dd89dcbe31feeeb8758f267ca987e57a32e694847c146384dc4638d69bbe9b045418b927848b9d40a8b716076c7253618b172bec2df37f6d03f3fb67a8d1a27