Overview
overview
7Static
static
3K&S.rar
windows7-x64
1K&S.rar
windows10-2004-x64
1Karma.exe
windows7-x64
7Karma.exe
windows10-2004-x64
alansito_file.pyc
windows7-x64
3alansito_file.pyc
windows10-2004-x64
3Slinky.exe
windows7-x64
7Slinky.exe
windows10-2004-x64
alansito_file.pyc
windows7-x64
3alansito_file.pyc
windows10-2004-x64
3slinky_library.dll
windows7-x64
5slinky_library.dll
windows10-2004-x64
5slinkyhook.dll
windows7-x64
1slinkyhook.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 19:21
Behavioral task
behavioral1
Sample
K&S.rar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
K&S.rar
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Karma.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Karma.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
alansito_file.pyc
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
alansito_file.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Slinky.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Slinky.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
alansito_file.pyc
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
alansito_file.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
slinky_library.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
slinky_library.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
slinkyhook.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
slinkyhook.dll
Resource
win10v2004-20231222-en
General
-
Target
alansito_file.pyc
-
Size
4KB
-
MD5
c0998c06705c44e0bd6a4cbbf508e71b
-
SHA1
1b71de6dc9ccf9f14387dea278758f91375bbe40
-
SHA256
54122eaf566d5ed59be4c9e79c89c7a2bb0daf189e9dbe47233eb097794da5f5
-
SHA512
92e285981aa9c0c0fc5586e84b81401b7c716694ec63f76dee5e348ee0efb4340c97ceda2107506ba63262f36aa144669fe8ac0831e264c6eac12e2d1f001964
-
SSDEEP
96:gfkejdNypus5TLitrIsXiVvaVp+PepA5TN3C9aZAV9fFUupVcgvsA:MkejOzTWsVvaT+Uq3CNfppVc8p
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 AcroRd32.exe 2740 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2784 wrote to memory of 3012 2784 cmd.exe 17 PID 2784 wrote to memory of 3012 2784 cmd.exe 17 PID 2784 wrote to memory of 3012 2784 cmd.exe 17 PID 3012 wrote to memory of 2740 3012 rundll32.exe 30 PID 3012 wrote to memory of 2740 3012 rundll32.exe 30 PID 3012 wrote to memory of 2740 3012 rundll32.exe 30 PID 3012 wrote to memory of 2740 3012 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\alansito_file.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\alansito_file.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\alansito_file.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c416a10009fa102db746325034ffc530
SHA1177f36007d65af3a61778356da66e4df00b67d44
SHA25648bddbb1f7e24a00c113bd8c2a570444dde22d366d20c1cc42b88d4f559f2620
SHA512fb5687293afaaedb2a40724e8c8198f4cfbdeb8b5bdeb1cc5d2ab1bf637170b7c3b297b96bee2cbaeba6e1138a95f4f0b00cb256077099bed1d797c3f4d8896a