Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-02-2024 21:33
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Loader.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Loader.pyc
Resource
win10v2004-20231215-en
General
-
Target
Loader.pyc
-
Size
27KB
-
MD5
b177d0351ac47689722ed71cca260948
-
SHA1
560d0749d713fdef65c6b92ec29f4e9277c4066f
-
SHA256
16ba144ab4bec59328aae25da6baa5daaf485e1f339607ffb6edc47671c72fa8
-
SHA512
89f7710a577746d257f03be938bf7e867106f98fff3135dd359dfa3145626e9af0a9906cc5110f0c30f3fa10621e33ffdcad082b7934cfd115a6ce3ac8ffce3b
-
SSDEEP
768:ktBfOjDXCzzm9U4VwbgtlI560vrGSj8jdGHOaTFp4/n2:kt4XiP4Bl4vrNj8jA/34/2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 AcroRd32.exe 2728 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2464 3048 cmd.exe 29 PID 3048 wrote to memory of 2464 3048 cmd.exe 29 PID 3048 wrote to memory of 2464 3048 cmd.exe 29 PID 2464 wrote to memory of 2728 2464 rundll32.exe 30 PID 2464 wrote to memory of 2728 2464 rundll32.exe 30 PID 2464 wrote to memory of 2728 2464 rundll32.exe 30 PID 2464 wrote to memory of 2728 2464 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Loader.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Loader.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Loader.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c2202090d5432a84bc567981bf32eb02
SHA1ea6960d1cd1e20f6d04cbc9e711f25c5abdc86bf
SHA256400fce9b8cc7662ee686b713755db21996b09effac7658ad8560e47f788401ec
SHA512627c8b3c8b267c6c24b7a07f6393e564e848c2c9ef0744f6ed8565e3e94b5d12d7e90cb3128a3987fc81349f44d5feaf9884c866d3d31b4be54f3af67d3933e7