Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 14:05
Behavioral task
behavioral1
Sample
917e60e904de5c286188692892de40704060e4e212a6b364b816e8c6cc5a805b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
917e60e904de5c286188692892de40704060e4e212a6b364b816e8c6cc5a805b.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Main.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Main.pyc
Resource
win10v2004-20231215-en
General
-
Target
Main.pyc
-
Size
12KB
-
MD5
602f70623e4648723a1ea230f053a1bf
-
SHA1
e1e0ca9fdacfdf1c5aa520393fe1f549ffed3369
-
SHA256
c6fe5ce41c02038586c776813b53d2400142f98c4370e1e04a67cac8b5d38cca
-
SHA512
aa41fab6724d7366edab4925dda39aac806475d9763964d94852be532bde309ab85b50f8e38ea73df9d238ba3383aa2ab0f1f2517f15d5828a5c1c19790555d2
-
SSDEEP
192:cM/H7S3jxNpK5Wal7AKm3G2SJD7hCUGeA/9y/dvh2O8m5PHoL:ceH7YYQWp5Aem9wdU5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\pyc_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1084 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1084 AcroRd32.exe 1084 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 3056 2220 cmd.exe 29 PID 2220 wrote to memory of 3056 2220 cmd.exe 29 PID 2220 wrote to memory of 3056 2220 cmd.exe 29 PID 3056 wrote to memory of 1084 3056 rundll32.exe 30 PID 3056 wrote to memory of 1084 3056 rundll32.exe 30 PID 3056 wrote to memory of 1084 3056 rundll32.exe 30 PID 3056 wrote to memory of 1084 3056 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Main.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD509c9917852fa97698619cf6144676452
SHA174e9f2d70c3e30daef9cc6a930f527474cd1805d
SHA2562324fea3987939f285ec58765cae40bf714795ae8b65dc9d3e41a367b172116b
SHA512a1a82af5e62635c726810b7abf7eeace8a4086e6b1329e052b33ba70016b50daa7d48dd57f49d871b7102cb2016f4ca2423505af393ee61ca20f44833fb5993a