Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 15:31 UTC
Behavioral task
behavioral1
Sample
Complex Tool/Complex.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Complex Tool/Complex.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
reg_backup.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
reg_backup.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Complex Tool/proxy.txt
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Complex Tool/proxy.txt
Resource
win10v2004-20240226-en
General
-
Target
reg_backup.pyc
-
Size
6KB
-
MD5
10fdb4b38c53a4831819705aab9f4c2e
-
SHA1
211afce3552e094054b4a2ceaa4e54bc4babb93e
-
SHA256
0209a0220ed750582b41b74187203a501c333f2bbc797d81976bb368a43597aa
-
SHA512
4d5b6204f09c01e88ed47c20a1fb0da4dbee1d1be5112417234735eafaa534d874f3a9efb1174d37cb6c80cd483406c16575400801a1f540d126680fa8ce427d
-
SSDEEP
96:q+CNsheuyFqytMAdchmmnf53CGKzGA6NL+8qGtQsGR7ds2WrReMFYQVGA:VCaheltMZm85CW+8h5Cs2IEMFYgF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2420 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2420 AcroRd32.exe 2420 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2536 2188 cmd.exe 29 PID 2188 wrote to memory of 2536 2188 cmd.exe 29 PID 2188 wrote to memory of 2536 2188 cmd.exe 29 PID 2536 wrote to memory of 2420 2536 rundll32.exe 30 PID 2536 wrote to memory of 2420 2536 rundll32.exe 30 PID 2536 wrote to memory of 2420 2536 rundll32.exe 30 PID 2536 wrote to memory of 2420 2536 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\reg_backup.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\reg_backup.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\reg_backup.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2420
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f7bb176ddf1b31b88156ba749dd30986
SHA18500a9c00201dbb7fb11fdededa9c6e3a9ff3d5e
SHA25650361e44436b137cd43ca919858028d42a20a399b70315841578436df971195e
SHA512ca4b21166ef72439975832588d1612366561d480076c95e86c31d7f4876e7199a720f92b82f59b47ec07517c6c0e503f8e06a6b13a875369111bcacfa36bbac4