Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-02-2024 16:02
Behavioral task
behavioral1
Sample
Unconfirmed 859683.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Unconfirmed 859683.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20231215-en
General
-
Target
main.pyc
-
Size
3KB
-
MD5
649f0b81940adea67761535febbe541b
-
SHA1
036d3b115f65011acb725d1c2639aad48f912b08
-
SHA256
6990d73da2b29f02609d05efd581fd1de772c116d6fe7b0d08cf5809c3f81040
-
SHA512
192c94e01eeaa861811e3a42bfbb81237da148b9d1ef92f19657278a0489230f055d7009d43e5fdee1a2c7a592d0d1f19a6d8572095f67eb23e61855979fcd24
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2256 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2256 AcroRd32.exe 2256 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2808 2424 cmd.exe 29 PID 2424 wrote to memory of 2808 2424 cmd.exe 29 PID 2424 wrote to memory of 2808 2424 cmd.exe 29 PID 2808 wrote to memory of 2256 2808 rundll32.exe 30 PID 2808 wrote to memory of 2256 2808 rundll32.exe 30 PID 2808 wrote to memory of 2256 2808 rundll32.exe 30 PID 2808 wrote to memory of 2256 2808 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2256
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c6fd3e4817866ffcb0a71122e3f5bc98
SHA1953ae092993855358c49001833fb31e2ce5fc7c7
SHA256b1b16abf1b430124e803f6e061b1d8540d4c357190859ffeadffc8ad5c62b6bb
SHA5127a4bd3d6c4db031a0f2cfe39791a2a869b553430b04b12369ae81caa2c8c01d68a7e5a10646b4ed75dcd3cc3f79115b61ff82d3df543fe33efebb5948a162ec2