Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
19-11-2023 13:21
Behavioral task
behavioral1
Sample
SPOILER_Security.py
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
SPOILER_Security.py
Resource
win10-20231020-en
Behavioral task
behavioral3
Sample
SPOILER_Security.py
Resource
win10v2004-20231020-en
General
-
Target
SPOILER_Security.py
-
Size
72KB
-
MD5
6d11490d443c437e341aec827d8f17a0
-
SHA1
fc86385cdc8938754669e9d77bcf4ba53d218197
-
SHA256
36f71bfdcab4c661fe79122526d3ba91a4fb404a5b5763e54f1b4a4029a096a6
-
SHA512
a5bb03d9324cf76add812cdd89d134e39f6869b7d43eea44e54d2f4dc8b1ee1253ea5dfe6df6fbc23812530bfc9884549c8c141166e8c7be675358602f6f868e
-
SSDEEP
1536:Q1kWRNvnhhFSQLhmVpoWDF95YeWB6U/Jf1pge4Fsu:Q1k6hhFhhgL95Yea6adpge4Fsu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2756 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2756 AcroRd32.exe 2756 AcroRd32.exe 2756 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2720 1264 cmd.exe 29 PID 1264 wrote to memory of 2720 1264 cmd.exe 29 PID 1264 wrote to memory of 2720 1264 cmd.exe 29 PID 2720 wrote to memory of 2756 2720 rundll32.exe 30 PID 2720 wrote to memory of 2756 2720 rundll32.exe 30 PID 2720 wrote to memory of 2756 2720 rundll32.exe 30 PID 2720 wrote to memory of 2756 2720 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SPOILER_Security.py1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SPOILER_Security.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SPOILER_Security.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD595b9a852040d2d4ac2b8c567e915eaf8
SHA1c15f4f267addab08c3fea081e01e4dbc707e79ca
SHA2564b6540c5ac2f28aa49b0e9875c81f3647bdd70e34fb89c3567e0951745430770
SHA5121b8198a6669aa4f3b2da3217241af7cdb6743983e143e24aca8b6d2361bf54ff76876f8849c0d4052b2fb5f79f2064616453520ecb833943abda894a5c6bf9fb