Analysis

  • max time kernel
    104s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 01:17

General

  • Target

    ACADEMY34-v0.19.3.4-win/lib/python2.7/chardet/langgreekmodel.pyo

  • Size

    24KB

  • MD5

    0890ddc8b23d57a4f8d17ecb0732ae5f

  • SHA1

    b265f4c51a49567575698c8c1dbf1dcca1d1b049

  • SHA256

    fe8f2f8df0019d2a41a0fd3469a52c72fd35f486596392b36644ab9612bbc6e6

  • SHA512

    f390a43fb9ce1e9f3bc4b1d3100f50e4c5e966f2357dbcd4d35c191db0a5c6390912885079ce8aa12d837f16fe83c56e5acbfedcd46c615b42a893168352cb43

  • SSDEEP

    48:YyOufZjYgRJq58kLnOufpOOYZRtOufpOyYZRsS4l:YyOufaVLnOufor9OufoH8J

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ACADEMY34-v0.19.3.4-win\lib\python2.7\chardet\langgreekmodel.pyo
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ACADEMY34-v0.19.3.4-win\lib\python2.7\chardet\langgreekmodel.pyo
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ACADEMY34-v0.19.3.4-win\lib\python2.7\chardet\langgreekmodel.pyo"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d191aa3207559ce4b6f100364600516f

    SHA1

    36398a50d926c126342cae740329172ecf1404f4

    SHA256

    4f0dde9c6c8134a18ba7f6eddb1b71630b9d5eda96e81b3ca737c1e0d1a00255

    SHA512

    1e3d5e6192a7f1a690c712a03068bdc455cc87c23a8e59b644a7bc2c23d42156fc44dce2e20cfa4bab11ba25efed0559f0b007688006d8eb36eb6c770560eac9