Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-03-2024 17:59

General

  • Target

    pycryptoconf-1.0.6/pycryptoconf/_mac/_core_foundation_cffi.py

  • Size

    10KB

  • MD5

    9954cc856f8a12e6646cf5586372eeda

  • SHA1

    cd6465f99ffca58e59cab32e5c95abb0408848ac

  • SHA256

    d4b49e078b7d5f4a0f24fdbf206f5158eb8eee4ab0b5adef38f76e08233f6557

  • SHA512

    c739a666f3a048624c7ceca35cb21fb0564e714b09204111e8ac8f68387b248b2d0b1ebc149cd140a5be9ff33e38cfe5415461f704632dc4e64d20d521d88474

  • SSDEEP

    192:6Q/MBDlyKrm6u+G7Jznsxh8UbDOSjazMniyYcBdgMPmvryGmR5zvoWum:6dDlRm6u+G7Jznsxh8UbDOSGzMUMuWvr

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\pycryptoconf-1.0.6\pycryptoconf\_mac\_core_foundation_cffi.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\pycryptoconf-1.0.6\pycryptoconf\_mac\_core_foundation_cffi.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\pycryptoconf-1.0.6\pycryptoconf\_mac\_core_foundation_cffi.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    90a2f1dbe66cf1272379cbf61e3c4e31

    SHA1

    4e82b884b91560714c926b9172feade060f36da8

    SHA256

    be9311b22e057cf8cea5599b64a5eb9c024e6d01cb2202ac76006645c064cacd

    SHA512

    742c773fe379bbb5cfbdce9a916afd66922cc1df19976a8d7d53276ff0ef4fe80e26d86ed5280db161d89d15a7208b063611d0bfe54a70b4936cc7ffef7e5902