Resubmissions

20-02-2024 00:51

240220-a7p21agc7s 10

20-02-2024 00:39

240220-azyzyagg33 10

Analysis

  • max time kernel
    360s
  • max time network
    361s
  • platform
    windows7_x64
  • resource
    win7-20231215-de
  • resource tags

    arch:x64arch:x86image:win7-20231215-delocale:de-deos:windows7-x64systemwindows
  • submitted
    20-02-2024 00:39

General

  • Target

    AIMr for exe.pyc

  • Size

    8KB

  • MD5

    806178d84f0ffd9322588a895c9f0ca1

  • SHA1

    19d7d0629d78f3203c6249508127d5d59226fa16

  • SHA256

    e2f88358c6d5d884418cf35d2b05878996c6b0989ab1cdda08423d5564c31f93

  • SHA512

    de0752ac08c0114dbc9247971174040551ef8f381616b2f130580b27953836a28b017f537f59819e6ee21f7b849832160d07692c78af6e5c562f1bae67e3a5db

  • SSDEEP

    192:6QW/WtrxIW0RjOkUFyfIngoARyjT/XE/rcfjMLgNkA4hhU:6Q0WZSVyFh0RyjT/0DcfjML24ha

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\AIMr for exe.pyc"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AIMr for exe.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AIMr for exe.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    531ae7343494ea2e34fbf027fc5d4b92

    SHA1

    561fc9195c37936c941982c8070d092b28067609

    SHA256

    1da0a716bbdab68cb7bb731f8c8532a338434e43801620fd53119da2c64c150e

    SHA512

    3af76bd952a7db88c6214867637da7281b906a9c2f9ce15a54019e707e7ecedf588d5b2f9493cb371102a8ee104fe41e817db3e8a22e4a8704d5cc577ae78dba