Analysis
-
max time kernel
17s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
69.py
Resource
win7-20240221-en
4 signatures
1800 seconds
Behavioral task
behavioral2
Sample
69.py
Resource
win10v2004-20240226-en
7 signatures
1800 seconds
General
-
Target
69.py
-
Size
19KB
-
MD5
b2023ca9a87a06b240088b00e5ef83aa
-
SHA1
b27472fba50d490b40cde139597e3dfd2668aab2
-
SHA256
a525bc7e456d30ddf50ec7201ee7b30c4481541190281094890b627d130badc1
-
SHA512
3b52e6aaa298283fe3016c20c7a8331a793586ecb45275e867ba5faad334ad3f1c004c4435cf42b9346731dbab411089d58f2ce229b5827e97cb860e373f9e5c
-
SSDEEP
384:DeLqNGS057NI5z+38prbRX81dk0sMPUmCIQicLB8Ip4WSe:loWYo58Tk0sMPUmCLpBH
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2552 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2552 2340 cmd.exe 29 PID 2340 wrote to memory of 2552 2340 cmd.exe 29 PID 2340 wrote to memory of 2552 2340 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\69.py1⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\69.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2552
-