Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 20:07
Behavioral task
behavioral1
Sample
GGG22.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GGG22.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
GGG22.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
GGG22.pyc
Resource
win10v2004-20240226-en
General
-
Target
GGG22.pyc
-
Size
2KB
-
MD5
c19dcaa234ba1997839ffba94d9b644f
-
SHA1
0a1fcbcd2db51fa76bd837a4545fde144dc8ddbf
-
SHA256
a7d4d86873bc56537c6533bfa2741bbf146f031d788e07dfbb5153a4fc8ed485
-
SHA512
0d0184017c90b77f5cab01b5b9501f35932af8fb332fd0786e68f64ee6c1291926b297be880a2bec29878ca310d5bfc3a14de29655afb65ef99d9a64c8cba2a1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2448 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2448 AcroRd32.exe 2448 AcroRd32.exe 2448 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2740 2748 cmd.exe 29 PID 2748 wrote to memory of 2740 2748 cmd.exe 29 PID 2748 wrote to memory of 2740 2748 cmd.exe 29 PID 2740 wrote to memory of 2448 2740 rundll32.exe 30 PID 2740 wrote to memory of 2448 2740 rundll32.exe 30 PID 2740 wrote to memory of 2448 2740 rundll32.exe 30 PID 2740 wrote to memory of 2448 2740 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\GGG22.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\GGG22.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\GGG22.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f61f55e83ce729a56e4c7e957737a3cf
SHA19dd10a24c6d1b67e2b65ad131963574fee3f5274
SHA25693943d5f579f2ceb8ba2b40f464f1d000dbee50e13606da0f15d05a3efd38a6f
SHA5124944f9b80ff5e3effcda4c5ba5e1437ee7bd2a6cc3ee3c531cefc7ccfc3b08c47c195f7be0aab72621cc3fff69be59442750ef50eb8bd5fea306f33de192baac