Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-02-2024 20:21
Behavioral task
behavioral1
Sample
NSFW Generator/NSFWGEN.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
NSFW Generator/NSFWGEN.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Creal.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Creal.pyc
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
NSFW Generator/start.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
NSFW Generator/start.bat
Resource
win10v2004-20240221-en
General
-
Target
Creal.pyc
-
Size
397KB
-
MD5
7bf34bc63c944b81516226e9ed996cf3
-
SHA1
23eb0ff3f0a315c5a81095d135537984a39ff5a7
-
SHA256
b88747a93c42675aafb603b1df42aadd5d3768ea21019cde2049c6031598da54
-
SHA512
d9915cc8f54443e381a924c5b9ce1e7ed5eb45ed898482cc549281fad61624d8b8ed250093262b6c3a731c63c9d2149ef38ae20ee212157a79ecea875b0f15ee
-
SSDEEP
6144:fQUg605ApAzYmfiTNh3zDv8GT72EBEO35rNx0E:oUg6nAUmfiTNh3zDv8GOLA5WE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2972 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2972 AcroRd32.exe 2972 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2556 2720 cmd.exe 29 PID 2720 wrote to memory of 2556 2720 cmd.exe 29 PID 2720 wrote to memory of 2556 2720 cmd.exe 29 PID 2556 wrote to memory of 2972 2556 rundll32.exe 30 PID 2556 wrote to memory of 2972 2556 rundll32.exe 30 PID 2556 wrote to memory of 2972 2556 rundll32.exe 30 PID 2556 wrote to memory of 2972 2556 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Creal.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Creal.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Creal.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5cd4d1c57ea3a9078e6b9af5e7dfa2af0
SHA13818607962e26be9bc68d15353e8ca866fff98cf
SHA25609b482096627910f64e6370bc95c1086252e984d9c66ee49eddfa5038337cdfa
SHA512d48ec64c7ac0982c6615f897eec9c2c08c864fae71b925b26b36b5ae81ea5afe8023aa640b62c68f32ae0f27fd24e53673cf127fc747a3bb4f2e83eb2d4ef68b