Overview
overview
10Static
static
10empyrean-m...ld.bat
windows7-x64
1empyrean-m...ld.bat
windows10-2004-x64
1empyrean-m...ain.py
windows7-x64
3empyrean-m...ain.py
windows10-2004-x64
3empyrean-m...ild.py
windows7-x64
3empyrean-m...ild.py
windows10-2004-x64
3empyrean-m...fig.py
windows7-x64
3empyrean-m...fig.py
windows10-2004-x64
3empyrean-m...env.py
windows7-x64
3empyrean-m...env.py
windows10-2004-x64
3empyrean-m...ate.py
windows7-x64
3empyrean-m...ate.py
windows10-2004-x64
3empyrean-m...fig.py
windows7-x64
3empyrean-m...fig.py
windows10-2004-x64
3empyrean-m...on.bat
windows7-x64
1empyrean-m...on.bat
windows10-2004-x64
8empyrean-m...bug.py
windows7-x64
3empyrean-m...bug.py
windows10-2004-x64
3empyrean-m...ers.py
windows7-x64
3empyrean-m...ers.py
windows10-2004-x64
3empyrean-m...ken.py
windows7-x64
3empyrean-m...ken.py
windows10-2004-x64
3empyrean-m...ion.py
windows7-x64
3empyrean-m...ion.py
windows10-2004-x64
3empyrean-m...tup.py
windows7-x64
3empyrean-m...tup.py
windows10-2004-x64
3empyrean-m...nfo.py
windows7-x64
3empyrean-m...nfo.py
windows10-2004-x64
3empyrean-m...fig.py
windows7-x64
3empyrean-m...fig.py
windows10-2004-x64
3empyrean-m...ain.py
windows7-x64
3empyrean-m...ain.py
windows10-2004-x64
3Analysis
-
max time kernel
127s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 08:22
Behavioral task
behavioral1
Sample
empyrean-main/build.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
empyrean-main/build.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
empyrean-main/builder/main.py
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
empyrean-main/builder/main.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
empyrean-main/builder/util/build.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
empyrean-main/builder/util/build.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
empyrean-main/builder/util/config.py
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
empyrean-main/builder/util/config.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
empyrean-main/builder/util/makeenv.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
empyrean-main/builder/util/makeenv.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
empyrean-main/builder/util/obfuscate.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
empyrean-main/builder/util/obfuscate.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
empyrean-main/builder/util/writeconfig.py
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
empyrean-main/builder/util/writeconfig.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
empyrean-main/install_python.bat
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
empyrean-main/install_python.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
empyrean-main/src/components/antidebug.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
empyrean-main/src/components/antidebug.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
empyrean-main/src/components/browsers.py
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
empyrean-main/src/components/browsers.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
empyrean-main/src/components/discordtoken.py
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
empyrean-main/src/components/discordtoken.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
empyrean-main/src/components/injection.py
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
empyrean-main/src/components/injection.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
empyrean-main/src/components/startup.py
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
empyrean-main/src/components/startup.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
empyrean-main/src/components/systeminfo.py
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
empyrean-main/src/components/systeminfo.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
empyrean-main/src/config.py
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
empyrean-main/src/config.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
empyrean-main/src/main.py
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
empyrean-main/src/main.py
Resource
win10v2004-20240226-en
General
-
Target
empyrean-main/builder/main.py
-
Size
1KB
-
MD5
d1cbf053305aae47d9b01d1475f78510
-
SHA1
2b30bd4b41fce3581515d420b38fb69de1af7dd8
-
SHA256
168aa0e72df036ec02b8c6597eb8a7d59163f244e5cb3df623af68852210d413
-
SHA512
7de74bc218fbafc321b7ef3226266c1f1ce0c8c832ab34c25e4585ae1af9a6e68dd51aa2e94194f853607383c7ac7f78774a524ebc6762955b4c84060d09604e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\py_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2708 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2708 AcroRd32.exe 2708 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2516 2496 cmd.exe 28 PID 2496 wrote to memory of 2516 2496 cmd.exe 28 PID 2496 wrote to memory of 2516 2496 cmd.exe 28 PID 2516 wrote to memory of 2708 2516 rundll32.exe 29 PID 2516 wrote to memory of 2708 2516 rundll32.exe 29 PID 2516 wrote to memory of 2708 2516 rundll32.exe 29 PID 2516 wrote to memory of 2708 2516 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\empyrean-main\builder\main.py1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\empyrean-main\builder\main.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\empyrean-main\builder\main.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5af9d8807e97a5f3767e39f5c497d231d
SHA1a4585d6757c1249d079da0ee16f5b7a94605537e
SHA2564b36132140ab7a3af87325a08482e49553ef771ca4784e8fb5aa5b9e615a9fee
SHA512fe71cb2dc4865b4ac13507282e3433143920d68c1bddb101737bab5b8ef982f4e3de459c10d06ffaba7b7a2a65292264914bc55304b99244289f487f7b1511e4