Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231201-en
  • resource tags

    arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2023, 12:50

General

  • Target

    main.pyc

  • Size

    30KB

  • MD5

    f0a2c1f08d49109cc4fbb518dea42552

  • SHA1

    36a14502225c93a02b2c3ba3f9b7983c5b9aee27

  • SHA256

    dbdeab5e1f8511e4626ebaebc89fc0ee59889a6d759e3b26ea78b6793b0cf67b

  • SHA512

    8c20a944fdab9abede1d848e9a115539a32e659c6fe32214bdf19f64ad50253f29f2a6a7f101c1d163e04753ecfb93c47543e1b1fb80b696c9408b5182f03cfb

  • SSDEEP

    768:6x1eKg0BsQBxmAaXBq6UkXT8jf/VAfGjVceHr/mHMyzUMNEDnHieCGHC:nKgG6YATO/V8AVH+zTNEDnzbi

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    9ab94b50bd5b92e6a9efc25197ea9575

    SHA1

    93c712131288a2d8e8d2c0f37d9a851a1151684c

    SHA256

    de05b32d3936e99bfdcdfc572c640f9ca9c486249407b34ada45ec3f0038c381

    SHA512

    dfa6964913e68636293858bb52273a5f8dc808024cecca37c3c9b8cb2c113b44a5424f64c7753abfbff9298b9c27fe63c83e30503ab56203f0256c539d4a431d