Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 20:08

General

  • Target

    TeddyPcApiRequests.pyc

  • Size

    44KB

  • MD5

    503feaa89ec55b48ba0d250eb0efddb7

  • SHA1

    a364d04b1361aa8dbdf45bd08f8ac27c487f9d70

  • SHA256

    3c7da6fe6d091ea44d2c56c089178156b432971fcb5d80ca6bedb88968f8deff

  • SHA512

    9155684181e64577566b9c3c5cac002069871f7c07befbe32bcd6731055606bafb4e13f735c4f2ea6559b77142a042bc4c76f0d3e24b747d8a4c6f8ab934ccf4

  • SSDEEP

    768:zeXiyP3ZdEVwoeImGlaDgm+owijQ/s3O2:zeXiyRdEVwoeImG4DgojO2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\TeddyPcApiRequests.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TeddyPcApiRequests.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TeddyPcApiRequests.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    80769b73da6bb4e3996fd8f6e0246bb0

    SHA1

    9797eda233d7c1302b997785948acd0fc4a080c5

    SHA256

    c62fd1e1d52ba7a60ae03404a541b3a6fc75a2e7ce0c3d9f97f59df58f217b18

    SHA512

    3bb97014d7e4107c79369a5fddacd9e74d9568ed06a3c86e048c9f2228bdeca1c873dcd09467cd8a37b0e16965f5dda46f76f9fa757938e42af6c35fd55b1a9e