Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 21:29
Behavioral task
behavioral1
Sample
Fight To The Death.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Fight To The Death.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
creal.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
creal.pyc
Resource
win10v2004-20240226-en
General
-
Target
creal.pyc
-
Size
32KB
-
MD5
686377a51e2d22fc749548894f57830e
-
SHA1
6c182815705ce635827e3c61a475743c8bb255c0
-
SHA256
e22abb31b07bf5fc19806087f3c921738fba5a9ce7c0ec190f83e5f3d77bfd79
-
SHA512
5710d83f8715d6e262e9352e8e8d25b719f01481c56a5017940936d7c5040cb05a5d73b7f56d849abb3164bf840317d6e5908742eeed601ac3a82788bf5fca85
-
SSDEEP
768:L8DnrjC2VsfNEiyAuAfKFMrRtfqtvEwS7bnjerAroaHjsIAvN8YC06X:IjrjQe3aKFcfDwS7fuPviYD6X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2600 AcroRd32.exe 2600 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2684 2744 cmd.exe 29 PID 2744 wrote to memory of 2684 2744 cmd.exe 29 PID 2744 wrote to memory of 2684 2744 cmd.exe 29 PID 2684 wrote to memory of 2600 2684 rundll32.exe 30 PID 2684 wrote to memory of 2600 2684 rundll32.exe 30 PID 2684 wrote to memory of 2600 2684 rundll32.exe 30 PID 2684 wrote to memory of 2600 2684 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\creal.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\creal.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\creal.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e18363bebc4f83202b85820c0301842b
SHA14a6b4307df67035ea3633fa5ed159976f05ba4d3
SHA256b14456dfc6216135d14e2fe8ff9f6f295acc72141e1cfc49c5f076e16313c74d
SHA512d1a214de00a8104c3a10ba56ac8eecf3dcb35d0c9938ac112d61bab17d9ec554f13d81b4fd3f8f7b20bb962def1e47848eb8220badc6e2a7c92a53cae8ec158e