Analysis

  • max time kernel
    212s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 05:26

General

  • Target

    exe.win-amd64-3.11/lib/Cryptodome/Cipher/_mode_ctr.pyc

  • Size

    15KB

  • MD5

    00884f39ecf2d859e86665c36cd40a54

  • SHA1

    6300e6049399c23d2529e0f3ab1fd237720574c0

  • SHA256

    27be87fbc5bee6ce4a89b15d36b8a94ae045d6c3448c68b50304b28704afadc8

  • SHA512

    a543895082d083b858b8a1b08c47fd407892f54f9d275c3eacdb418eaa40e7fa9b63f48cdfad003786a016cca5117993ae49cb481e5d6c48edc6c997519d720e

  • SSDEEP

    192:mtGDPkH7KxiM16TsyXiFfU4PkdU4fYrLEj4SkIkjaXfAhS1LbM:mwb0SDe2fTPkdTfYrLPSkI+aX31M

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\exe.win-amd64-3.11\lib\Cryptodome\Cipher\_mode_ctr.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\exe.win-amd64-3.11\lib\Cryptodome\Cipher\_mode_ctr.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\exe.win-amd64-3.11\lib\Cryptodome\Cipher\_mode_ctr.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    4dc3e688b96cb1ff366807f5ac4fdefe

    SHA1

    e893d7a6b3166aa8da494d374b5353a1903c6279

    SHA256

    34e6b90a2d03e1fbf1624be7c03475abec6eedb41034b5a629c9c0efca9e6591

    SHA512

    573eb70c14eaa824ea0d77f8f96745ffa5d9050bc58600c657fdad7dc217a61081f68ca88b109c215dfb4228c098abe2cb22cf8c69c87560665f10ff051c9b33