Analysis

  • max time kernel
    126s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2024 11:12

General

  • Target

    Xvirus-Tools-1.7.1/util/options/mass_report.py

  • Size

    1KB

  • MD5

    cb6e68aec2d603b5177f1227ce88c431

  • SHA1

    bbe7006c81b8968b02127522b521fb2b0086e126

  • SHA256

    879e4942541b288b5f6e5479a3badb8d2c7def127c1bbc8609ccbb7418ad222d

  • SHA512

    00ffead5131ca63c7b1d1337ea05ae72c69718a9ecebbe804a9e8f5b5b5a4a2fb3f2d3347206254d343cab2e855a78b9afdff197fe2129a617c381b61399c923

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Xvirus-Tools-1.7.1\util\options\mass_report.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Xvirus-Tools-1.7.1\util\options\mass_report.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Xvirus-Tools-1.7.1\util\options\mass_report.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    c27ce3488838a800086d816c4ab2a3bb

    SHA1

    9a36ec42920bbeed02c952f327a3d63ae16a958e

    SHA256

    610a80f67ec814888850e3bf88a736b951705b1a002137e11793a8190cdad1e9

    SHA512

    c37130b153f498b88e68332da643f082653ee2624848d6bde10007f41c79781d288741f557aded0c3c9c625ceda538522f48adbd4806aadb6f263659b9762746