Analysis
-
max time kernel
18s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 19:55
Behavioral task
behavioral1
Sample
TPD-Keys.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
TPD-Keys.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
tpd-keys.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
tpd-keys.pyc
Resource
win10v2004-20231215-en
General
-
Target
tpd-keys.pyc
-
Size
2KB
-
MD5
cfea6c1de7042354aed4fb315b49e910
-
SHA1
4333eb7fd7fda8aa2f0d7165ba06014e501127f2
-
SHA256
73602bbc2cb052a86fc6efbd28fed0b854a2330ab049e1951539ed2283e3fbd9
-
SHA512
40d9dfc5c505b4b1bcc507c58345181dd991422bcf74b0972ee09832df87529e5325bd2399a4034b7d1352814d6c934b95635ad22673c30e9041d0ad6a911828
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2652 AcroRd32.exe 2652 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2372 2612 cmd.exe 29 PID 2612 wrote to memory of 2372 2612 cmd.exe 29 PID 2612 wrote to memory of 2372 2612 cmd.exe 29 PID 2372 wrote to memory of 2652 2372 rundll32.exe 30 PID 2372 wrote to memory of 2652 2372 rundll32.exe 30 PID 2372 wrote to memory of 2652 2372 rundll32.exe 30 PID 2372 wrote to memory of 2652 2372 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\tpd-keys.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\tpd-keys.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\tpd-keys.pyc"3⤵
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5daf23c0ac8bea162a4cc0afd457ab26d
SHA1892132713a83526c708cec12cbc054f3ff365ff1
SHA256683483cf8ce7cf421d712b787bd6ee5eaac2019a37af02c4d9301f6760c2f26b
SHA512a0c7723f5b77a873d6378ca193af90cc92c4a9cdcc6050fd750353de603f77c2613ea666fc004913d5ca65c4c0fccd1361c0f74b0d3706823a9536623a860696