Resubmissions
22-12-2023 09:04
231222-k1vc9agbf3 322-12-2023 09:02
231222-kzksesebdq 322-12-2023 08:57
231222-kwmgvaeaen 7Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 09:04
Behavioral task
behavioral1
Sample
test-yUGEp.pyc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
test-yUGEp.pyc
Resource
win10v2004-20231215-en
General
-
Target
test-yUGEp.pyc
-
Size
74KB
-
MD5
63bcf387b9281fe4ab5af557f33fc41c
-
SHA1
fb8b40342ce244199123625aedf7df76ad23488c
-
SHA256
032d9585febd6b3eb89aad1f088abe52493938812179a72dcff08e13526f614a
-
SHA512
cb4a474a469f947b65858b00b450172f40c1279d73e698415e2c401c02d14caa691074cb9dad69868bbcef7330e61c47d281c4de0996d0fadc30ac8f54d467e5
-
SSDEEP
1536:FKwZq1Wa/hYx/Ys/A/ki5wD66lbcaMrW5N0G:FbZkWa/WdCsi5ku69
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2584 2164 cmd.exe 15 PID 2164 wrote to memory of 2584 2164 cmd.exe 15 PID 2164 wrote to memory of 2584 2164 cmd.exe 15
Processes
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\test-yUGEp.pyc1⤵PID:2584
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\test-yUGEp.pyc"2⤵PID:2612
-
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\test-yUGEp.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a3b1366e5af3b7d4c13edac51fc8bb33
SHA15d5a90114a1ee1258207dd3f5c00ccda1e8314b2
SHA2564e2ec438bbee691952cece9a583cfc022bac9fb2c39338e0e408ed64926e5ace
SHA512337905df5d5577a314a2d6d812ce9627efa7dbbf5ef8afee10983322afcfc2e522fba580d8bd304874368fc38d070e55158d6783e6afc048a448e3c378febf19