Analysis

  • max time kernel
    158s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2023, 00:05

General

  • Target

    usr/lib/python3.11/site-packages/ansible_collections/amazon/aws/plugins/doc_fragments/aws_credentials.py

  • Size

    1KB

  • MD5

    5f2cf7b27c714bc5ebc69778e2306960

  • SHA1

    243525a552ee8bde93111d091795449dee0d2f52

  • SHA256

    5bf58fccfb29994200623e8e2122544477c3e649b1527fd6fb683e3e90b3de15

  • SHA512

    b4813d0ede030ecda19d40c3d505dbe846a999e988ec952235a1f3ca30b9ec1fdf9ba8e9fd88ec4be2bf9048e4c9a65e86bf96c1f6d621449c8c8fab415e6ee2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\amazon\aws\plugins\doc_fragments\aws_credentials.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\amazon\aws\plugins\doc_fragments\aws_credentials.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\amazon\aws\plugins\doc_fragments\aws_credentials.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    b42ca627196683925ca755147640a987

    SHA1

    640918e76b37c30963191c02043be77b30c762c6

    SHA256

    8deba369fc5ffb0ccd15d2ce489d24ab9c91af8da33d4ef997caceb4c4574994

    SHA512

    5ce17ad0e7e1b5fa123e5b394a1dd4f08ff24f78f4ed5e6b2b7cde1514a987efc2a3b6e6c81fb90b04e23e2089e83206bcd2dfe8763c413dfae66c27a8e2d30e