Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
67bfaac6be8e193f4a760fba392ab31b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67bfaac6be8e193f4a760fba392ab31b.exe
Resource
win10v2004-20231215-en
General
-
Target
67bfaac6be8e193f4a760fba392ab31b.exe
-
Size
92KB
-
MD5
67bfaac6be8e193f4a760fba392ab31b
-
SHA1
e6ad84722da5e386b455c9c8a941c2096dff9b11
-
SHA256
44f94b74bb9e588937aacc5c8ceb375d1cf188c41c3b48cdca39038892f32f87
-
SHA512
13d34ef9bfc14c9866b2a86fc8d360e8dcb3f01c20c0cecfbacd438ff946861ef9258ccd94e0fec4d698705cab4af9dd833edd2593f8dbf4c2de0676fd7a9315
-
SSDEEP
1536:92i98shPjjBkvWN/3HgGl+CocTzFJ0T72VpQ8:A/A7/HpBTzFJ0T72c8
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pypos.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 67bfaac6be8e193f4a760fba392ab31b.exe -
Executes dropped EXE 1 IoCs
pid Process 2444 pypos.exe -
Loads dropped DLL 2 IoCs
pid Process 2088 67bfaac6be8e193f4a760fba392ab31b.exe 2088 67bfaac6be8e193f4a760fba392ab31b.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /d" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /l" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /y" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /p" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /a" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /v" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /b" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /t" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /k" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /f" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /u" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /h" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /g" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /q" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /c" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /x" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /w" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /k" 67bfaac6be8e193f4a760fba392ab31b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /m" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /i" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /e" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /r" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /o" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /s" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /z" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /n" pypos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\pypos = "C:\\Users\\Admin\\pypos.exe /j" pypos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2088 67bfaac6be8e193f4a760fba392ab31b.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe 2444 pypos.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2088 67bfaac6be8e193f4a760fba392ab31b.exe 2444 pypos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2444 2088 67bfaac6be8e193f4a760fba392ab31b.exe 28 PID 2088 wrote to memory of 2444 2088 67bfaac6be8e193f4a760fba392ab31b.exe 28 PID 2088 wrote to memory of 2444 2088 67bfaac6be8e193f4a760fba392ab31b.exe 28 PID 2088 wrote to memory of 2444 2088 67bfaac6be8e193f4a760fba392ab31b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\67bfaac6be8e193f4a760fba392ab31b.exe"C:\Users\Admin\AppData\Local\Temp\67bfaac6be8e193f4a760fba392ab31b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\pypos.exe"C:\Users\Admin\pypos.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5506ae1083b69688259945d37764766a1
SHA17770edb098978bd1603c1ea7232d27eefdaee396
SHA256eea840feef59c7fd97f9942e93954ff5cc11e035e458f1d277aa708f60c16a1a
SHA512bb597e39fa79ddfa09ca63d224ea9e93ea10fe1352d4c95c6fde93191ad16eef139a9674ead3a21985c4875289f0acd593b1d17de076b3af21546e04325a7619