Analysis

  • max time kernel
    152s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 19:12

General

  • Target

    SPOILER_Security.py

  • Size

    72KB

  • MD5

    981e9429debd8dfcd7fb51db2cd2a641

  • SHA1

    6e18429b493134edae93a8269ab1f3e6b14cc4b8

  • SHA256

    7fc4baee5b7ba4c7e97e9d0842327a67cdcaf862dc86ac3a81d890e807d6cb8b

  • SHA512

    69e512ecc15ccb614ff1834dfdbcc46170ac55f74dc353b2e4e2aed61590881c2d85238d09e1f53c030b4eed7aa4de743fee6904a4970edd4844d11964d333d7

  • SSDEEP

    1536:Q1kWRdnhhFSQLhmVpoWDF95YeWB6U/Jf1pge4Fsu:Q1kyhhFhhgL95Yea6adpge4Fsu

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\SPOILER_Security.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SPOILER_Security.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SPOILER_Security.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    655c7e66acae142a1df4d08374cfd55d

    SHA1

    f6e7304d5eac7732674d5af7ecfda9c172e1c2ba

    SHA256

    8f940ab27acd47717ff0eaf066dd74505f1f0c6c0ebf6d2da8a6d48d497af8ce

    SHA512

    bc12a8656becc57a687ac782f41432a8c577eb9853192a4d11f62e3c5c851f907ac5253869aa4df5c4e030abb2ecb68a9bc830337c52c169056e672cf95334e3