Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-03-2024 19:24
Behavioral task
behavioral1
Sample
imthebiggestsexhaver.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
imthebiggestsexhaver.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
creal.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
creal.pyc
Resource
win10v2004-20240226-en
General
-
Target
creal.pyc
-
Size
32KB
-
MD5
58e8befb60f3bc6e773fc663cd1ef561
-
SHA1
fe4cc51bb2f09ca417cd2c4397db74b2cd537b41
-
SHA256
14ac594228236acc07a6dd29b886645dcd6fe1c35d9b72ad357434dea71c863f
-
SHA512
12a8984e3fb1fdc87e1d47b00fbda92a9de4c4d819bb67e49ee16bac1cdcd4b90f23ba27781271b0659460e32484e85f6e3425b53acfda7b0ac2c0f43fa6c9df
-
SSDEEP
768:L8DnrY2VsfNEiyAuAfKFMrRtfqtvEwS7bnjerAroaHDsIAvN8YC06X:Ijrie3aKFcfDwS7fOPviYD6X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2852 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2852 AcroRd32.exe 2852 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2576 2100 cmd.exe 29 PID 2100 wrote to memory of 2576 2100 cmd.exe 29 PID 2100 wrote to memory of 2576 2100 cmd.exe 29 PID 2576 wrote to memory of 2852 2576 rundll32.exe 30 PID 2576 wrote to memory of 2852 2576 rundll32.exe 30 PID 2576 wrote to memory of 2852 2576 rundll32.exe 30 PID 2576 wrote to memory of 2852 2576 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\creal.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\creal.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\creal.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD559bbd02019fe4ce23d9b6ab9059fad12
SHA1fe3e12269613a0998ebb5ee31547ad7e277cc7d7
SHA25602b883ed2fa510ae30fc43932087c79e7565b0af215e9b646220bd7be260c9d0
SHA51295173364e3845a62094bdd6996512d9da121825639746aa96c4b72aa5f936d25b4f06553ddd6f12915a950503d0bcb6143cdc3e0e6fafb50f585991e07ad5546