Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-02-2024 08:14
Behavioral task
behavioral1
Sample
AV-2.scr
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AV-2.scr
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
ftpcrack.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ftpcrack.pyc
Resource
win10v2004-20231215-en
General
-
Target
ftpcrack.pyc
-
Size
32KB
-
MD5
1e0549b7106e9085964955099e5efd56
-
SHA1
03b04da2206eb8b101d886a61c0919973e4edd14
-
SHA256
c6b61e1c3eea026b3891661cf1e947bf55bdcc351058dbac36df92c0f541fd2a
-
SHA512
8ff93bc7b31fd7c577acb5300c9f3801b36cb28aa4179bc1af5e5feb17e9a0eb8fd28e005747409611872eca6f282ead9f738dda0934085844aa61d991a0c953
-
SSDEEP
768:tV24RMymk8c+Tga2TgRt1dlbI06UGxLPi2QvYHMTsFocaLbReaDjuP:tV249mPzg9TgpdlbI0OFPrQvYsgFocaE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2716 AcroRd32.exe 2716 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1392 2092 cmd.exe 29 PID 2092 wrote to memory of 1392 2092 cmd.exe 29 PID 2092 wrote to memory of 1392 2092 cmd.exe 29 PID 1392 wrote to memory of 2716 1392 rundll32.exe 30 PID 1392 wrote to memory of 2716 1392 rundll32.exe 30 PID 1392 wrote to memory of 2716 1392 rundll32.exe 30 PID 1392 wrote to memory of 2716 1392 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ftpcrack.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ftpcrack.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ftpcrack.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a4125e0c53aaa22fed06cc286d8c16c2
SHA1b33705f2282ccda57fa85ab709cfa9fca1828de7
SHA25677894b9e17d95df0576d7742968a6060f0e708c99cfa8f7de712bc214c041e8d
SHA5120798b2c30017cc38239b6b75442c6e6546295130346323ec3de40833c59f6239b9b03d23b5bd9fa11e36c64a1d1e0eaaa53abd32858f2048f00b79ce8b8915ea