Resubmissions
21/02/2024, 14:47
240221-r547kshc7v 321/02/2024, 14:26
240221-rrz1pshe46 321/02/2024, 14:23
240221-rqhd9shd98 3Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
app.py
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
app.py
Resource
win10v2004-20240221-en
General
-
Target
app.py
-
Size
2KB
-
MD5
befa40113608c40a268e7963ee682aee
-
SHA1
08baa05d0394fc8f7dd0221b0f6b9c4e257cdc4e
-
SHA256
cc58635de4a9d9843ee909fbb89cc061347dd63fa9e48b19716794238178cc22
-
SHA512
65c3e75d1264dfa791b7613e315dc332496de1150aeca04501d96b32b0cac85edcaaa28f839c1f2ac4a93cb3b2de278855b8654d60ba91c2a3208fb133b8ccf4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2740 AcroRd32.exe 2740 AcroRd32.exe 2740 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2820 1648 cmd.exe 29 PID 1648 wrote to memory of 2820 1648 cmd.exe 29 PID 1648 wrote to memory of 2820 1648 cmd.exe 29 PID 2820 wrote to memory of 2740 2820 rundll32.exe 30 PID 2820 wrote to memory of 2740 2820 rundll32.exe 30 PID 2820 wrote to memory of 2740 2820 rundll32.exe 30 PID 2820 wrote to memory of 2740 2820 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\app.py1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\app.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\app.py"3⤵
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:268
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56818d8bfc237ac74633c0ce7e9026ea3
SHA15deb8ad2eaed69ad9bcb6c715a6ed6313eec4e56
SHA2568e7254bfda55700fef948d9d434c3597f09f10cd5555b90fcb6de72206e51040
SHA51246d6a0ecbf9e59f90d7abb3bad992e08a246993dd06c244f1457b821821d5bf1c38757812b4c67f5103a4ae931af14b225a4b549501e482c8d2cb0cb64fb7ed1