Overview
overview
3Static
static
3OAEXPTOOL/...38.pyc
windows7-x64
3OAEXPTOOL/...38.pyc
windows10-2004-x64
3OAEXPTOOL/...38.pyc
windows7-x64
3OAEXPTOOL/...38.pyc
windows10-2004-x64
3OAEXPTOOL/...38.pyc
windows7-x64
3OAEXPTOOL/...38.pyc
windows10-2004-x64
3OAEXPTOOL/...38.pyc
windows7-x64
3OAEXPTOOL/...38.pyc
windows10-2004-x64
3OAEXPTOOL/...38.pyc
windows7-x64
3OAEXPTOOL/...38.pyc
windows10-2004-x64
3OAEXPTOOL/...38.pyc
windows7-x64
3OAEXPTOOL/...38.pyc
windows10-2004-x64
3OAEXPTOOL/...ole.py
windows7-x64
3OAEXPTOOL/...ole.py
windows10-2004-x64
3OAEXPTOOL/...eal.py
windows7-x64
3OAEXPTOOL/...eal.py
windows10-2004-x64
3OAEXPTOOL/...put.py
windows7-x64
3OAEXPTOOL/...put.py
windows10-2004-x64
3OAEXPTOOL/...est.py
windows7-x64
3OAEXPTOOL/...est.py
windows10-2004-x64
3OAEXPTOOL/...tle.py
windows7-x64
3OAEXPTOOL/...tle.py
windows10-2004-x64
3OAEXPTOOL/...aml.py
windows7-x64
3OAEXPTOOL/...aml.py
windows10-2004-x64
3OAEXPTOOL/...can.py
windows7-x64
3OAEXPTOOL/...can.py
windows10-2004-x64
3OAEXPTOOL/...all.sh
windows7-x64
3OAEXPTOOL/...all.sh
windows10-2004-x64
3OAEXPTOOL/...11.pyc
windows7-x64
3OAEXPTOOL/...11.pyc
windows10-2004-x64
3OAEXPTOOL/...38.pyc
windows7-x64
3OAEXPTOOL/...38.pyc
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-03-2024 15:59
Behavioral task
behavioral1
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/console.cpython-38.pyc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/console.cpython-38.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/deal.cpython-38.pyc
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/deal.cpython-38.pyc
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/output.cpython-38.pyc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/output.cpython-38.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/request.cpython-38.pyc
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/request.cpython-38.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/title.cpython-38.pyc
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/title.cpython-38.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/yaml.cpython-38.pyc
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/__pycache__/yaml.cpython-38.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/console.py
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/console.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/deal.py
Resource
win7-20240319-en
Behavioral task
behavioral16
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/deal.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/output.py
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/output.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/request.py
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/request.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/title.py
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/title.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/yaml.py
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
OAEXPTOOL/OA-EXPTOOL-main/main/yaml.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
OAEXPTOOL/OA-EXPTOOL-main/scan.py
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
OAEXPTOOL/OA-EXPTOOL-main/scan.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
OAEXPTOOL/linux_install.sh
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
OAEXPTOOL/linux_install.sh
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
OAEXPTOOL/main/__pycache__/console.cpython-311.pyc
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
OAEXPTOOL/main/__pycache__/console.cpython-311.pyc
Resource
win10v2004-20240319-en
Behavioral task
behavioral31
Sample
OAEXPTOOL/main/__pycache__/console.cpython-38.pyc
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
OAEXPTOOL/main/__pycache__/console.cpython-38.pyc
Resource
win10v2004-20240226-en
General
-
Target
OAEXPTOOL/OA-EXPTOOL-main/main/output.py
-
Size
1KB
-
MD5
2441f2203c62a34de1d4ded26eebf831
-
SHA1
9cfb13faedc79da7fc793f0703804a710abf9c4e
-
SHA256
e654d05ccf580bf5d2d8a9ed64a8b11b2fecdda259607bbaa3825c023082a7ce
-
SHA512
cc633ad53a0f6c5dbf8b1e9073492cca48fbc84bc59de8bc7613b5d3ab61abe23d03a103984739515bb801ca825b28a14a626ca5f3611b90f38ee4abe9a604a4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2600 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2600 AcroRd32.exe 2600 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1964 wrote to memory of 2556 1964 cmd.exe rundll32.exe PID 1964 wrote to memory of 2556 1964 cmd.exe rundll32.exe PID 1964 wrote to memory of 2556 1964 cmd.exe rundll32.exe PID 2556 wrote to memory of 2600 2556 rundll32.exe AcroRd32.exe PID 2556 wrote to memory of 2600 2556 rundll32.exe AcroRd32.exe PID 2556 wrote to memory of 2600 2556 rundll32.exe AcroRd32.exe PID 2556 wrote to memory of 2600 2556 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\OAEXPTOOL\OA-EXPTOOL-main\main\output.py1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\OAEXPTOOL\OA-EXPTOOL-main\main\output.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\OAEXPTOOL\OA-EXPTOOL-main\main\output.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5eeafd39b5ef2cb42628d209c78e83f9f
SHA162df255fdf2557019a1c9acd2fab36db08fad424
SHA256ebe4f3e8f0783bc907a31e827d71eca5484cfa2e3a1d648f6052a88a83aeb662
SHA512c7a9b4933d3db41b8f64df9dd454f7567be52324b3598d5804599f011cdbd12ee25c90b92315764b225d8f661142d72387508faa23a9b55c3872942af7a07bf5