Analysis

  • max time kernel
    160s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 17:28

General

  • Target

    1.py

  • Size

    38KB

  • MD5

    e9ec8214ccf648f6db1d3720bb310173

  • SHA1

    38008b7a7aefc1ebeb8e80066efd22147cd7a39d

  • SHA256

    cb26520a6265b20af0590f33bfbc02437f1a4a14fc2de65b74b55f705b44790e

  • SHA512

    de322ed3894247e3a70c8560a974b5c09cd95aefe299c001d56ac51de66822346b3dcb168b5e429812bc9d16ce9d66179e2f12ed94e48baf11e7aec08ab60c29

  • SSDEEP

    768:6abxgKa+MpVRbQ8mTJTdmn34QLfKEMM17mnNX/DtcV+sWQ1:xxoLbQaXwEXx1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\1.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          560cd71a5d2904fdf7938625a061784c

          SHA1

          23f819af849b40e76d6fa17212200370d7ed5ef4

          SHA256

          50ffc1676d973fc95f68bd5e95dd915cdc775ba3270788e7c7b9845a0cade402

          SHA512

          89eefb8cbcd8c7df1aa57dc8232d06614a89e30f7330174d25604af9327bb19fb6f055fa5376f70f5caafe7dd23ccbaa8c9264632ac8c8e5b501b538f7333d49