Analysis
-
max time kernel
360s -
max time network
361s -
platform
windows7_x64 -
resource
win7-20231215-de -
resource tags
arch:x64arch:x86image:win7-20231215-delocale:de-deos:windows7-x64systemwindows -
submitted
20-02-2024 00:39
Behavioral task
behavioral1
Sample
AIMr.exe
Resource
win7-20231215-de
Behavioral task
behavioral2
Sample
AIMr.exe
Resource
win10v2004-20231215-de
Behavioral task
behavioral3
Sample
AIMr for exe.pyc
Resource
win7-20231215-de
Behavioral task
behavioral4
Sample
AIMr for exe.pyc
Resource
win10v2004-20231215-de
General
-
Target
AIMr for exe.pyc
-
Size
8KB
-
MD5
806178d84f0ffd9322588a895c9f0ca1
-
SHA1
19d7d0629d78f3203c6249508127d5d59226fa16
-
SHA256
e2f88358c6d5d884418cf35d2b05878996c6b0989ab1cdda08423d5564c31f93
-
SHA512
de0752ac08c0114dbc9247971174040551ef8f381616b2f130580b27953836a28b017f537f59819e6ee21f7b849832160d07692c78af6e5c562f1bae67e3a5db
-
SSDEEP
192:6QW/WtrxIW0RjOkUFyfIngoARyjT/XE/rcfjMLgNkA4hhU:6Q0WZSVyFh0RyjT/0DcfjML24ha
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\pyc_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2872 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2872 AcroRd32.exe 2872 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2860 1848 cmd.exe 29 PID 1848 wrote to memory of 2860 1848 cmd.exe 29 PID 1848 wrote to memory of 2860 1848 cmd.exe 29 PID 2860 wrote to memory of 2872 2860 rundll32.exe 30 PID 2860 wrote to memory of 2872 2860 rundll32.exe 30 PID 2860 wrote to memory of 2872 2860 rundll32.exe 30 PID 2860 wrote to memory of 2872 2860 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\AIMr for exe.pyc"1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AIMr for exe.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AIMr for exe.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5531ae7343494ea2e34fbf027fc5d4b92
SHA1561fc9195c37936c941982c8070d092b28067609
SHA2561da0a716bbdab68cb7bb731f8c8532a338434e43801620fd53119da2c64c150e
SHA5123af76bd952a7db88c6214867637da7281b906a9c2f9ce15a54019e707e7ecedf588d5b2f9493cb371102a8ee104fe41e817db3e8a22e4a8704d5cc577ae78dba