Resubmissions
15-04-2024 19:47
240415-yhvsysee92 1011-02-2024 21:53
240211-1rtncsbh6y 1011-02-2024 16:00
240211-tf4wmahe8s 10Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-02-2024 16:00
Behavioral task
behavioral1
Sample
Tools.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Tools.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
creal.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
creal.pyc
Resource
win10v2004-20231215-en
General
-
Target
creal.pyc
-
Size
32KB
-
MD5
651717bdcddac421fd3ffa1e23f14ece
-
SHA1
3074d6ad6c2cbce00a9de2307d1664d80d890c39
-
SHA256
18c562fc51a4b30bca6aeca0e07bd3455b0aab96441dea4be498051783bd80b2
-
SHA512
1c35e2905a026f7eda5dc7675967c7b41ca055f3efe9eb89d5f152160f3bb4165286adad16fcda72834bb684b10627824dfda3187e03990f3703d9d2943dfd9e
-
SSDEEP
768:L8Dnr72VsfNEiyGuAfKFMrRtfqtvEwS7bnjerAroaHjsIAcn8YC06X:IjrveZaKFcfDwS7fuPc8YD6X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2908 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2908 AcroRd32.exe 2908 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3016 2496 cmd.exe 29 PID 2496 wrote to memory of 3016 2496 cmd.exe 29 PID 2496 wrote to memory of 3016 2496 cmd.exe 29 PID 3016 wrote to memory of 2908 3016 rundll32.exe 30 PID 3016 wrote to memory of 2908 3016 rundll32.exe 30 PID 3016 wrote to memory of 2908 3016 rundll32.exe 30 PID 3016 wrote to memory of 2908 3016 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\creal.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\creal.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\creal.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d51883ed7e4bd18f5f9eefe7b00fc119
SHA1e18af28321d68acae0a63a4fed945293a3466c2b
SHA256c9ba1f3ca48e3bf00d2849788cd776db8b1b4e5fd92d8a65d13569079c784bbd
SHA512230fc8e42f71567d738969543038d9f945a5e75fe726315f982de9a5c6a5cdb04162c0a003e6c84093d2bee92547697b94bc9f37647408b3d1d32710c6a1ce7e