Analysis

  • max time kernel
    293s
  • max time network
    325s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2023, 00:05

General

  • Target

    usr/lib/python3.11/site-packages/ansible_collections/amazon/aws/plugins/lookup/aws_service_ip_ranges.py

  • Size

    3KB

  • MD5

    abae0df2afea129451ad188a14ed31a8

  • SHA1

    419bff05b4809b0cb5b05cadca20eb15b30cdf9e

  • SHA256

    8a92c20f1aa0a0c24b2332e2b2325e3fae5c25ffe7aa2cdc91197632388b9c36

  • SHA512

    f5783ca7a946b8c313d1f6646b344200bb1dce76708c79d15f4efc5897d05519e23235b0092e588ee47d34bbfd3c2d1e68e3653027a36093aaeff5af41a8874a

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\amazon\aws\plugins\lookup\aws_service_ip_ranges.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\amazon\aws\plugins\lookup\aws_service_ip_ranges.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\usr\lib\python3.11\site-packages\ansible_collections\amazon\aws\plugins\lookup\aws_service_ip_ranges.py"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e8eaea1d8fc0383eb308eb8799c35909

    SHA1

    995c53fbf225031d6314013e3926328b0e5abac6

    SHA256

    860ade9485f710fd1c0d24d39c4c3897202246d046c33779ebcff0377af11f8a

    SHA512

    37eebf9f178c295d46b9a2a02d4beac93e99b256273b02c07e47202fe24a2e600d99cbd917f304aed18a95b3d7848109b83c10582925d5daa82fa27a42c1a4cf