Analysis
-
max time kernel
160s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-02-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
massdm/main.py
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
massdm/main.py
Resource
win10v2004-20240226-en
General
-
Target
massdm/main.py
-
Size
13KB
-
MD5
0c0b063fd46da68ee589501a08959bed
-
SHA1
a2f5660d975f02e587e289102777e8b98cdbb234
-
SHA256
f8e1ceca8b109730c3450d280c9f62fb98afee0338118070e2c7f2793e46c691
-
SHA512
9e5dc1db72dec6133609659f893f3da1cf6c7f6a67c4fcb685046dd377c15247a797eb900ed936717632a3db35348f17c0164b58dd861dfcf62755301fe2c3e5
-
SSDEEP
384:ZYWfBQ7c+whoif5au2QB+cQnL+UiPU9YD:ZNQ/wWif5H2y+c29ic4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\py_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2416 AcroRd32.exe 2416 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2536 1708 cmd.exe 28 PID 1708 wrote to memory of 2536 1708 cmd.exe 28 PID 1708 wrote to memory of 2536 1708 cmd.exe 28 PID 2536 wrote to memory of 2416 2536 rundll32.exe 29 PID 2536 wrote to memory of 2416 2536 rundll32.exe 29 PID 2536 wrote to memory of 2416 2536 rundll32.exe 29 PID 2536 wrote to memory of 2416 2536 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\massdm\main.py1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\massdm\main.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\massdm\main.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2416
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53ee48585cc07b076a8483bde0f3764e1
SHA18c588aa353ecdfbc653b2f659beeb18fe1696d67
SHA2564fe5ccd34c747859bf6e65f70b6a0366acb306d3cbc22119fdfbbbbda51da38a
SHA51241a1743d7d9df9f7fad8a0c245310d55672648d279373eaeb17d55701cf0ce6b28f4e2a4dd01613eb19ec7826d631c9abcf4f03d1496c23fa4bdf1c5fb891d75