Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2024 16:02

General

  • Target

    main.pyc

  • Size

    3KB

  • MD5

    649f0b81940adea67761535febbe541b

  • SHA1

    036d3b115f65011acb725d1c2639aad48f912b08

  • SHA256

    6990d73da2b29f02609d05efd581fd1de772c116d6fe7b0d08cf5809c3f81040

  • SHA512

    192c94e01eeaa861811e3a42bfbb81237da148b9d1ef92f19657278a0489230f055d7009d43e5fdee1a2c7a592d0d1f19a6d8572095f67eb23e61855979fcd24

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    c6fd3e4817866ffcb0a71122e3f5bc98

    SHA1

    953ae092993855358c49001833fb31e2ce5fc7c7

    SHA256

    b1b16abf1b430124e803f6e061b1d8540d4c357190859ffeadffc8ad5c62b6bb

    SHA512

    7a4bd3d6c4db031a0f2cfe39791a2a869b553430b04b12369ae81caa2c8c01d68a7e5a10646b4ed75dcd3cc3f79115b61ff82d3df543fe33efebb5948a162ec2