Overview
overview
7Static
static
3sync-tool-...nt.exe
windows7-x64
7sync-tool-...nt.exe
windows10-2004-x64
7sync-client.pyc
windows7-x64
3sync-client.pyc
windows10-2004-x64
3sync-tool-...er.exe
windows7-x64
7sync-tool-...er.exe
windows10-2004-x64
7sync-server.pyc
windows7-x64
3sync-server.pyc
windows10-2004-x64
3sync-tool-...ent.py
windows7-x64
3sync-tool-...ent.py
windows10-2004-x64
3sync-tool-...ver.py
windows7-x64
3sync-tool-...ver.py
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 10:48
Behavioral task
behavioral1
Sample
sync-tool-main/Windows-64bit/sync-client.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
sync-tool-main/Windows-64bit/sync-client.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
sync-client.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
sync-client.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
sync-tool-main/Windows-64bit/sync-server.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
sync-tool-main/Windows-64bit/sync-server.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
sync-server.pyc
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
sync-server.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
sync-tool-main/sync-client.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
sync-tool-main/sync-client.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
sync-tool-main/sync-server.py
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
sync-tool-main/sync-server.py
Resource
win10v2004-20240226-en
General
-
Target
sync-tool-main/sync-server.py
-
Size
3KB
-
MD5
916ddf110ffb40202e43dcb4d21cb295
-
SHA1
6fcdb5771f578b9bddc9e6df63fa4375b23d0633
-
SHA256
1a5f160f4c103a980d58ded2ee1a89b30df904f14e3bb99d120f609c9e484cd0
-
SHA512
9f34aafd5f0a84b7dfc21093ddb9644e5f5d8fd19a91a7058557ffc4145e26bab8fee6e78c58159447968a83a3af98967f997360e6f35a458ee7af0b7448b70b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 AcroRd32.exe 2740 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2544 2192 cmd.exe 29 PID 2192 wrote to memory of 2544 2192 cmd.exe 29 PID 2192 wrote to memory of 2544 2192 cmd.exe 29 PID 2544 wrote to memory of 2740 2544 rundll32.exe 30 PID 2544 wrote to memory of 2740 2544 rundll32.exe 30 PID 2544 wrote to memory of 2740 2544 rundll32.exe 30 PID 2544 wrote to memory of 2740 2544 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sync-tool-main\sync-server.py1⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sync-tool-main\sync-server.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sync-tool-main\sync-server.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56e3dbcc5de0126326b834ab6d527dff7
SHA1068e1ef34709f996a7eb3d646b6e1bd5e616952f
SHA256f157e0137ffe43df1543060820e2955d89a1a70d996fbefc9fb8f359d93ad545
SHA51202f8787db2bdda55c9e420e00d83f1f14c63054e5f9f01e7573c0c57c5938cee2f684b945e698121f51fbab2d214769a1262c8182f4f53d5dd6984b5dad2aafa