Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 20:07

General

  • Target

    GGG22.pyc

  • Size

    2KB

  • MD5

    c19dcaa234ba1997839ffba94d9b644f

  • SHA1

    0a1fcbcd2db51fa76bd837a4545fde144dc8ddbf

  • SHA256

    a7d4d86873bc56537c6533bfa2741bbf146f031d788e07dfbb5153a4fc8ed485

  • SHA512

    0d0184017c90b77f5cab01b5b9501f35932af8fb332fd0786e68f64ee6c1291926b297be880a2bec29878ca310d5bfc3a14de29655afb65ef99d9a64c8cba2a1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\GGG22.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\GGG22.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\GGG22.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f61f55e83ce729a56e4c7e957737a3cf

    SHA1

    9dd10a24c6d1b67e2b65ad131963574fee3f5274

    SHA256

    93943d5f579f2ceb8ba2b40f464f1d000dbee50e13606da0f15d05a3efd38a6f

    SHA512

    4944f9b80ff5e3effcda4c5ba5e1437ee7bd2a6cc3ee3c531cefc7ccfc3b08c47c195f7be0aab72621cc3fff69be59442750ef50eb8bd5fea306f33de192baac