Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-02-2024 22:46
Behavioral task
behavioral1
Sample
yeno assist.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
yeno assist.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
creal.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
creal.pyc
Resource
win10v2004-20231215-en
General
-
Target
creal.pyc
-
Size
53KB
-
MD5
d57cf76bc9d4158773bd335fc1ca207e
-
SHA1
d69be95135b1028fb6fb3043854fa94a5a97cf29
-
SHA256
b18befb3044fe1773846c72752ff0dd63aeb02b231972d94d23018fc51d1db9f
-
SHA512
082a46834c0811005073a522d26384a8bb215dfc3e5348c419deb3e2fdafde0ede57e309ee0d09fc1735273499dbfc78faa5f18981ebeea998773df40685da8b
-
SSDEEP
1536:2raaqMamq3YwmQyLCipnml5ZOhLQmGwCo3gX:2u7MapmJpnDSou
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 AcroRd32.exe 2804 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2356 1964 cmd.exe 29 PID 1964 wrote to memory of 2356 1964 cmd.exe 29 PID 1964 wrote to memory of 2356 1964 cmd.exe 29 PID 2356 wrote to memory of 2804 2356 rundll32.exe 30 PID 2356 wrote to memory of 2804 2356 rundll32.exe 30 PID 2356 wrote to memory of 2804 2356 rundll32.exe 30 PID 2356 wrote to memory of 2804 2356 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\creal.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\creal.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\creal.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5eaa4bf25ac6cc709a2c47a2140727ad6
SHA14c474cfda898917629eab33c7b177f1e4c431129
SHA256a13ac0971d6426892332e839aca20a7f4134f2720ebf57a176ef96c4d53deb53
SHA5124554f15af4a6e783d731dd4e01236d63423b87a83ca74a4071fc1e9cc6726f329f2d602e00a62f87a2b030a43d669eab78e78ee41255c792977fa48b9722e505