Overview
overview
3Static
static
1bots/boost...10.pyc
windows7-x64
3bots/boost...10.pyc
windows10-2004-x64
3bots/boost...11.pyc
windows7-x64
3bots/boost...11.pyc
windows10-2004-x64
3bots/boost...uth.py
windows7-x64
3bots/boost...uth.py
windows10-2004-x64
3bots/boost...ain.py
windows7-x64
3bots/boost...ain.py
windows10-2004-x64
3bots/shop bot/main.py
windows7-x64
3bots/shop bot/main.py
windows10-2004-x64
3bots/ticke...ll.bat
windows7-x64
1bots/ticke...ll.bat
windows10-2004-x64
1bots/tickets/main.py
windows7-x64
3bots/tickets/main.py
windows10-2004-x64
3bots/ticke...at.bat
windows7-x64
1bots/ticke...at.bat
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-02-2024 17:28
Static task
static1
Behavioral task
behavioral1
Sample
bots/boost bot src/__pycache__/keyauth.cpython-310.pyc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bots/boost bot src/__pycache__/keyauth.cpython-310.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
bots/boost bot src/__pycache__/keyauth.cpython-311.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
bots/boost bot src/__pycache__/keyauth.cpython-311.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
bots/boost bot src/keyauth.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
bots/boost bot src/keyauth.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
bots/boost bot src/main.py
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
bots/boost bot src/main.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
bots/shop bot/main.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
bots/shop bot/main.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
bots/tickets/insall.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
bots/tickets/insall.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
bots/tickets/main.py
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
bots/tickets/main.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
bots/tickets/strat.bat
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
bots/tickets/strat.bat
Resource
win10v2004-20240221-en
General
-
Target
bots/shop bot/main.py
-
Size
14KB
-
MD5
f48ade1faf05ce3b360dcc872d55c097
-
SHA1
0e24537691feff4bafc76cdf1abe22e96072d6a0
-
SHA256
0b9ba700c862120ab36406706d59a75cf295eadda0f52dacae97484ae5c6f53c
-
SHA512
12ccda142fce7da231d398d758776d3872a452dd1f11aeb4e1280d4bc7da55d93150955fe4cb879cc0df6d8f95b2e887a8999a7bedad37e1254276d25cbdb593
-
SSDEEP
384:20u77u4M+EqmmKmZJC3Iz+tEQZJdusN8CNO+QrTmHcE3rkHwWU:20l3Iz+tEQZJdusN8CNOprTccCkpU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.py rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 AcroRd32.exe 2804 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2560 1288 cmd.exe 29 PID 1288 wrote to memory of 2560 1288 cmd.exe 29 PID 1288 wrote to memory of 2560 1288 cmd.exe 29 PID 2560 wrote to memory of 2804 2560 rundll32.exe 30 PID 2560 wrote to memory of 2804 2560 rundll32.exe 30 PID 2560 wrote to memory of 2804 2560 rundll32.exe 30 PID 2560 wrote to memory of 2804 2560 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bots\shop bot\main.py"1⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bots\shop bot\main.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bots\shop bot\main.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c0182ad4fdcd071e3dede649435f6961
SHA14fff86c34576b7a8a253019b4cbb31d589839638
SHA25661e4a61a62861416b485a49ba914621982d3b56ab2a59e4237a9266df5c20da1
SHA512a6d6567d4f2567b90bf281f1a7fbb46ad81c83dc28eec2850cb29dc6fb69d1faa9b40b79272cae8e54bc06a51ccfd46ed8e724bc34649b407e40c7061c3aea1e