Analysis
-
max time kernel
152s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 19:12
Behavioral task
behavioral1
Sample
SPOILER_Security.py
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SPOILER_Security.py
Resource
win10v2004-20230915-en
General
-
Target
SPOILER_Security.py
-
Size
72KB
-
MD5
981e9429debd8dfcd7fb51db2cd2a641
-
SHA1
6e18429b493134edae93a8269ab1f3e6b14cc4b8
-
SHA256
7fc4baee5b7ba4c7e97e9d0842327a67cdcaf862dc86ac3a81d890e807d6cb8b
-
SHA512
69e512ecc15ccb614ff1834dfdbcc46170ac55f74dc353b2e4e2aed61590881c2d85238d09e1f53c030b4eed7aa4de743fee6904a4970edd4844d11964d333d7
-
SSDEEP
1536:Q1kWRdnhhFSQLhmVpoWDF95YeWB6U/Jf1pge4Fsu:Q1kyhhFhhgL95Yea6adpge4Fsu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2868 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2868 AcroRd32.exe 2868 AcroRd32.exe 2868 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2528 2860 cmd.exe 29 PID 2860 wrote to memory of 2528 2860 cmd.exe 29 PID 2860 wrote to memory of 2528 2860 cmd.exe 29 PID 2528 wrote to memory of 2868 2528 rundll32.exe 30 PID 2528 wrote to memory of 2868 2528 rundll32.exe 30 PID 2528 wrote to memory of 2868 2528 rundll32.exe 30 PID 2528 wrote to memory of 2868 2528 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SPOILER_Security.py1⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SPOILER_Security.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SPOILER_Security.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5655c7e66acae142a1df4d08374cfd55d
SHA1f6e7304d5eac7732674d5af7ecfda9c172e1c2ba
SHA2568f940ab27acd47717ff0eaf066dd74505f1f0c6c0ebf6d2da8a6d48d497af8ce
SHA512bc12a8656becc57a687ac782f41432a8c577eb9853192a4d11f62e3c5c851f907ac5253869aa4df5c4e030abb2ecb68a9bc830337c52c169056e672cf95334e3