Overview
overview
10Static
static
7res/script...od.pyc
windows7-x64
3res/script...od.pyc
windows10-2004-x64
3res/script...__.pyc
windows7-x64
3res/script...__.pyc
windows10-2004-x64
3res/script...ts.pyc
windows7-x64
3res/script...ts.pyc
windows10-2004-x64
3res/script...cy.pyc
windows7-x64
3res/script...cy.pyc
windows10-2004-x64
3res/script...__.pyc
windows7-x64
3res/script...__.pyc
windows10-2004-x64
3res/script...__.pyc
windows7-x64
3res/script...__.pyc
windows10-2004-x64
3res/script...or.pyc
windows7-x64
3res/script...or.pyc
windows10-2004-x64
3res/script...ts.pyc
windows7-x64
3res/script...ts.pyc
windows10-2004-x64
3res/script...ls.pyc
windows7-x64
3res/script...ls.pyc
windows10-2004-x64
3res/script...__.pyc
windows7-x64
3res/script...__.pyc
windows10-2004-x64
3res/script...or.pyc
windows7-x64
3res/script...or.pyc
windows10-2004-x64
3res/script...ew.pyc
windows7-x64
3res/script...ew.pyc
windows10-2004-x64
3res/script...ix.pyc
windows7-x64
3res/script...ix.pyc
windows10-2004-x64
3res/script...ts.pyc
windows7-x64
3res/script...ts.pyc
windows10-2004-x64
3setup.exe
windows7-x64
10setup.exe
windows10-2004-x64
10Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-02-2024 01:25
Behavioral task
behavioral1
Sample
res/scripts/client/gui/mods/mod_pmod.pyc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
res/scripts/client/gui/mods/mod_pmod.pyc
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
res/scripts/client/gui/pmod/__init__.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
res/scripts/client/gui/pmod/__init__.pyc
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
res/scripts/client/gui/pmod/_constants.pyc
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
res/scripts/client/gui/pmod/_constants.pyc
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
res/scripts/client/gui/pmod/_legacy.pyc
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
res/scripts/client/gui/pmod/_legacy.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
res/scripts/client/gui/pmod/controllers/__init__.pyc
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
res/scripts/client/gui/pmod/controllers/__init__.pyc
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
res/scripts/client/gui/pmod/data/__init__.pyc
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
res/scripts/client/gui/pmod/data/__init__.pyc
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
res/scripts/client/gui/pmod/data_collector.pyc
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
res/scripts/client/gui/pmod/data_collector.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
res/scripts/client/gui/pmod/events.pyc
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
res/scripts/client/gui/pmod/events.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
res/scripts/client/gui/pmod/utils.pyc
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
res/scripts/client/gui/pmod/utils.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
res/scripts/client/gui/pmod/views/__init__.pyc
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
res/scripts/client/gui/pmod/views/__init__.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
res/scripts/client/gui/pmod/views/battleInjector.pyc
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
res/scripts/client/gui/pmod/views/battleInjector.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
res/scripts/client/gui/pmod/views/battleView.pyc
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
res/scripts/client/gui/pmod/views/battleView.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
res/scripts/client/gui/mods/mod_battle_results_fix.pyc
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
res/scripts/client/gui/mods/mod_battle_results_fix.pyc
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
res/scripts/client/gui/mods/mod_sights.pyc
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
res/scripts/client/gui/mods/mod_sights.pyc
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
setup.exe
Resource
win7-20231215-en
General
-
Target
res/scripts/client/gui/pmod/_legacy.pyc
-
Size
442KB
-
MD5
63cb6e1d201ffd0e2bf7bd35cd67b720
-
SHA1
c9138a3148512cac34e851c15bbaf2184a5983c7
-
SHA256
fb279ca0f51a5323371c1fd24ce827979eece4e9618e1e26645cf71bdbf009b7
-
SHA512
205f4e7d4fbf1d17717ab4fbf07b2d3ee343cd51dad03ce45d5e79fd5b56b6d0158449d6e94a6ce1dfc58f133aa854e3637ee2520138ff5c95627527adafb6eb
-
SSDEEP
12288:Z8Ut7+4ylPxHR3C+Os+Vw6ZlKH+jx3tQDyrY8M6:Z8UpjiKe+V9ldx3tky5M6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2724 AcroRd32.exe 2724 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2852 2428 cmd.exe 29 PID 2428 wrote to memory of 2852 2428 cmd.exe 29 PID 2428 wrote to memory of 2852 2428 cmd.exe 29 PID 2852 wrote to memory of 2724 2852 rundll32.exe 30 PID 2852 wrote to memory of 2724 2852 rundll32.exe 30 PID 2852 wrote to memory of 2724 2852 rundll32.exe 30 PID 2852 wrote to memory of 2724 2852 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\res\scripts\client\gui\pmod\_legacy.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\res\scripts\client\gui\pmod\_legacy.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\res\scripts\client\gui\pmod\_legacy.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f7209f7f5a9aac5859c5f0a2d32429df
SHA15fcc86f8ec15e62959eff6d9745c717a450a6fca
SHA256d5c1d498de060328b025be738787ad24700d6a110ed8e3e00bd0a34aa8ecdbf9
SHA5126543855b23be582c0ad21816af6584e2a355e0dec9873503a21b8f8ea0bf6b7dbb14578a99a21ddd11c21a57e4dd0ab86c48daf79638b7dee215875fefdbda11