Overview
overview
10Static
static
10OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...er.exe
windows7-x64
7OURTanks_s...er.exe
windows10-2004-x64
7OURTanks_s...t__.py
windows7-x64
3OURTanks_s...t__.py
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3OURTanks_s...12.pyc
windows7-x64
3OURTanks_s...12.pyc
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-02-2024 14:00
Behavioral task
behavioral1
Sample
OURTanks_setup/__pycache__/Xvirus.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
OURTanks_setup/__pycache__/Xvirus.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
OURTanks_setup/luncher.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
OURTanks_setup/luncher.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
OURTanks_setup/util/__init__.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
OURTanks_setup/util/__init__.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
OURTanks_setup/util/__pycache__/__init__.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
OURTanks_setup/util/__pycache__/__init__.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
OURTanks_setup/util/options/__pycache__/bypass_rules.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
OURTanks_setup/util/options/__pycache__/bypass_rules.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
OURTanks_setup/util/options/__pycache__/channel_spammer.cpython-312.pyc
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
OURTanks_setup/util/options/__pycache__/channel_spammer.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
OURTanks_setup/util/options/__pycache__/hypesquad_changer.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
OURTanks_setup/util/options/__pycache__/hypesquad_changer.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
OURTanks_setup/util/options/__pycache__/mass_report.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
OURTanks_setup/util/options/__pycache__/mass_report.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
OURTanks_setup/util/options/__pycache__/soundboard_spammer.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
OURTanks_setup/util/options/__pycache__/soundboard_spammer.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
OURTanks_setup/util/options/__pycache__/token_bio_changer.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
OURTanks_setup/util/options/__pycache__/token_bio_changer.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
OURTanks_setup/util/options/__pycache__/token_checker.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
OURTanks_setup/util/options/__pycache__/token_checker.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
OURTanks_setup/util/options/__pycache__/token_global_nicker.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
OURTanks_setup/util/options/__pycache__/token_global_nicker.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
OURTanks_setup/util/options/__pycache__/token_joiner.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
OURTanks_setup/util/options/__pycache__/token_joiner.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral27
Sample
OURTanks_setup/util/options/__pycache__/token_leaver.cpython-312.pyc
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
OURTanks_setup/util/options/__pycache__/token_leaver.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral29
Sample
OURTanks_setup/util/options/__pycache__/token_pron_changer.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
OURTanks_setup/util/options/__pycache__/token_pron_changer.cpython-312.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral31
Sample
OURTanks_setup/util/options/__pycache__/token_saver.cpython-312.pyc
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
OURTanks_setup/util/options/__pycache__/token_saver.cpython-312.pyc
Resource
win10v2004-20240221-en
General
-
Target
OURTanks_setup/util/options/__pycache__/channel_spammer.cpython-312.pyc
-
Size
8KB
-
MD5
f7c9285204e0a031610fbaed495242b4
-
SHA1
aa98d9dd0792922b91e0faeaed6a8201000a75c1
-
SHA256
78806af117b7857c94940b705798ff9b79f7764ab1e9a134a78d49b20a0b51ef
-
SHA512
6a40c253e3494ad6572e6adfbe280c45d7440afe4c642091c7d73461f5fb9e8edf0410a8d96a345586aa6d5fc8e74f2cf5c74745af9c6c6e09e152c05c1aaf4c
-
SSDEEP
96:DcpXmf1OVvmN9D7kbzncFjUlX6SFrGwlqFAhgf62:kXmf1OUz2KolXJHUFA2f62
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2296 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2296 AcroRd32.exe 2296 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2632 3024 cmd.exe 29 PID 3024 wrote to memory of 2632 3024 cmd.exe 29 PID 3024 wrote to memory of 2632 3024 cmd.exe 29 PID 2632 wrote to memory of 2296 2632 rundll32.exe 30 PID 2632 wrote to memory of 2296 2632 rundll32.exe 30 PID 2632 wrote to memory of 2296 2632 rundll32.exe 30 PID 2632 wrote to memory of 2296 2632 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\OURTanks_setup\util\options\__pycache__\channel_spammer.cpython-312.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\OURTanks_setup\util\options\__pycache__\channel_spammer.cpython-312.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\OURTanks_setup\util\options\__pycache__\channel_spammer.cpython-312.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2296
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59730f8ea38d3a157399583f0962dbf34
SHA17347786ae76f1901eed5e974ec4c81b71b02dbee
SHA2566714f9cc63e15a4234623838ea1596266a04e06459d4a4dc7d0a003937e9db85
SHA512d8c3ce66ec18401beb7efdf724ca6c029dca6d3385e20be686b7538f4dcd8a27f6f6a9823695fc86ea51b5675ce5526008b925f833a46a4211555aab53b60700