Analysis

  • max time kernel
    153s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 05:26

General

  • Target

    exe.win-amd64-3.11/lib/Cryptodome/Cipher/_mode_ccm.pyc

  • Size

    25KB

  • MD5

    ccbad7d94822d1a742c64defd39bab01

  • SHA1

    694fad588d955eabe08c41f630d7c4551b0618d3

  • SHA256

    113e3baeb76127624daa562fecbb39f08e083b67fafd46e729b56b20849d1f24

  • SHA512

    515e4b4e63e7c284c8e37e9919d11dd435e79ca4069f683c1c47c69798e7212a11a1f680cec7d09f1423bca9bf153283f395827d2bbc27fb399ba1a85d11da69

  • SSDEEP

    384:Tq/qgU1Xl1wB3ziI4SiI4QuogPD8jLmv4SeWPj7KzPc4eqEu:T5/wJDEI4VPWmvxeG7KYW

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\exe.win-amd64-3.11\lib\Cryptodome\Cipher\_mode_ccm.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\exe.win-amd64-3.11\lib\Cryptodome\Cipher\_mode_ccm.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\exe.win-amd64-3.11\lib\Cryptodome\Cipher\_mode_ccm.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          bdb79bf14343250c3e18d1c65a9fe5c6

          SHA1

          5ed982104f41a2d1903753c92643200176cc7880

          SHA256

          e05ae399b9da7041c108bc3c5b488e947772b98074f2dc3a47a32a630c051e5f

          SHA512

          13442d777a0830e06acc3645295089c25c0d8afeeec758e60c40bac328993a8e70444c746c92c93f6123f9838d3512df4a9768c68ec62ac2495be969df64ff45