Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 20:21
Behavioral task
behavioral1
Sample
beans.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
beans.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
beans.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
beans.pyc
Resource
win10v2004-20231222-en
General
-
Target
beans.pyc
-
Size
5KB
-
MD5
0855932203ee1e6be4fd2404beeccbc0
-
SHA1
e0cefe0214740e0ec980ed0845ad44922d795c29
-
SHA256
58d462dfbcb816851223e03d909547852e2cc1cfb5a190768d26b8e19c09b2fd
-
SHA512
6b9dc80ab9f092fa0a397481d7711a3a9f30fbbdd2641dfb63e540ec726464a9739cd3142007da2a456dc7cdfe9364d266502a818d7d45387bba2ba1586795f6
-
SSDEEP
96:6WdWWOrTS4zlFaP4nQ4GOOwAggBk8t6hteEQPwzYb7orkTAqn:6sirbz2b7aAlW8YzwPwno
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\pyc_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1160 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1160 AcroRd32.exe 1160 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2824 2088 cmd.exe 29 PID 2088 wrote to memory of 2824 2088 cmd.exe 29 PID 2088 wrote to memory of 2824 2088 cmd.exe 29 PID 2824 wrote to memory of 1160 2824 rundll32.exe 30 PID 2824 wrote to memory of 1160 2824 rundll32.exe 30 PID 2824 wrote to memory of 1160 2824 rundll32.exe 30 PID 2824 wrote to memory of 1160 2824 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\beans.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\beans.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\beans.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1160
-
-