Analysis

  • max time kernel
    159s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 21:41

General

  • Target

    MinGW64/bin/lib/encodings/aliases.pyc

  • Size

    8KB

  • MD5

    67ee7ec45c339432f4554c97d0b94c8e

  • SHA1

    fb1203f22a2f2357df6db0dd4d5597d93bafed80

  • SHA256

    41ffad9290a0c3356bd3fed529f7210b84f3648b30a570ced0f2e208c508b8e8

  • SHA512

    39c321d9ef5b1a7c29531ca1a0d8584ee4d5a0491bbf85f0cca1c2fbb628d3f2c869fe23231ccb9e21ee7ab316cb85a757a53d1d3420cd13716b09fba6c6ad1f

  • SSDEEP

    192:8HGjLzPuAX1Ox+2iFJRbkz0JFJqX0zLDCxKjHN1UjYwQRZmnV:8MD9UxXaRYF0x7TZCV

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\MinGW64\bin\lib\encodings\aliases.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MinGW64\bin\lib\encodings\aliases.pyc
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MinGW64\bin\lib\encodings\aliases.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    db151670e915f16c8a15ee5efb9f374c

    SHA1

    0d34848fe76afb69c057b01d7d82acb5321711b7

    SHA256

    d418882a5eec75919174bc6480d7e133c8f2d482bbeed1ad5fe369b89f35e530

    SHA512

    1a32d3b4910356488c0b7e595be132d61bed8ae7ca31041b5198932cdcad4ecd47fb11e9d1357693697487f0d6c54e0af3895cc549d823f06edc50c04abd0748