Analysis
-
max time kernel
160s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
1.py
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1.py
Resource
win10v2004-20231215-en
General
-
Target
1.py
-
Size
38KB
-
MD5
e9ec8214ccf648f6db1d3720bb310173
-
SHA1
38008b7a7aefc1ebeb8e80066efd22147cd7a39d
-
SHA256
cb26520a6265b20af0590f33bfbc02437f1a4a14fc2de65b74b55f705b44790e
-
SHA512
de322ed3894247e3a70c8560a974b5c09cd95aefe299c001d56ac51de66822346b3dcb168b5e429812bc9d16ce9d66179e2f12ed94e48baf11e7aec08ab60c29
-
SSDEEP
768:6abxgKa+MpVRbQ8mTJTdmn34QLfKEMM17mnNX/DtcV+sWQ1:xxoLbQaXwEXx1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1648 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1648 AcroRd32.exe 1648 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2680 2784 cmd.exe 30 PID 2784 wrote to memory of 2680 2784 cmd.exe 30 PID 2784 wrote to memory of 2680 2784 cmd.exe 30 PID 2680 wrote to memory of 1648 2680 rundll32.exe 31 PID 2680 wrote to memory of 1648 2680 rundll32.exe 31 PID 2680 wrote to memory of 1648 2680 rundll32.exe 31 PID 2680 wrote to memory of 1648 2680 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1.py1⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5560cd71a5d2904fdf7938625a061784c
SHA123f819af849b40e76d6fa17212200370d7ed5ef4
SHA25650ffc1676d973fc95f68bd5e95dd915cdc775ba3270788e7c7b9845a0cade402
SHA51289eefb8cbcd8c7df1aa57dc8232d06614a89e30f7330174d25604af9327bb19fb6f055fa5376f70f5caafe7dd23ccbaa8c9264632ac8c8e5b501b538f7333d49