Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18-12-2023 15:25
Behavioral task
behavioral1
Sample
Noru.py
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Noru.py
Resource
win10v2004-20231215-en
General
-
Target
Noru.py
-
Size
42KB
-
MD5
89c1b770039b4f897f2cb1cd06e75938
-
SHA1
96d9a792bc615342d1a2d4a4b42965f0e3dc01d1
-
SHA256
040d9fb3e529cd3ce1169261e30c45fd1773987ed4a28696772cb67e39a730bb
-
SHA512
04e529b559bc032ab411f6ad6d62585aad49ea808b66dbc962f90a329c157a36b4ae72deaa301afcf747bb31810d0be258450dfbf301a9fd5c9c77641d53ec9c
-
SSDEEP
768:Q1DAWRmnXeihOCSlqLCxzAj6VppDPi7WR:Q1kWRmnhhFSQLhmVpoWR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2612 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2612 AcroRd32.exe 2612 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2584 2164 cmd.exe 29 PID 2164 wrote to memory of 2584 2164 cmd.exe 29 PID 2164 wrote to memory of 2584 2164 cmd.exe 29 PID 2584 wrote to memory of 2612 2584 rundll32.exe 30 PID 2584 wrote to memory of 2612 2584 rundll32.exe 30 PID 2584 wrote to memory of 2612 2584 rundll32.exe 30 PID 2584 wrote to memory of 2612 2584 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Noru.py1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Noru.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Noru.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51d0c8d039a6bab48673decb4e5f9086c
SHA1c3e81e93099c12da752425675c89ce55d1896b15
SHA256ac5e534c45293cad6810dffb85a87f53469c132d30796ee8299e8c7ba1b6a33a
SHA512f3673b8ed9e5492e97e6d54793af37e9edd6f2abf4a4a9fd16d88d194caa62a4cd0296766061dceb64bb7b5112136fea943cf1621c3917eba3ba4e12949a80d8