Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 21:41

General

  • Target

    MinGW64/bin/lib/encodings/base64_codec.py

  • Size

    2KB

  • MD5

    04f4540dc6f7be7b2800b8713af4dd02

  • SHA1

    b59196a702597f6c4a29a4fa2c2dab227ce52f89

  • SHA256

    cf0eba7dae05767ef434c355cd54649237b9e5629051b44f3f1a2a846384d6bf

  • SHA512

    fb037f65c10ecea88473bf2cb26f0fc8f73aa87f9a56190430ccf65a646398b12650d46c956e323e7adb7d465ffb1250be449ab2062489e37eab48a7708243d5

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\MinGW64\bin\lib\encodings\base64_codec.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MinGW64\bin\lib\encodings\base64_codec.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MinGW64\bin\lib\encodings\base64_codec.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    48e3c5e7e0031d9be08bbbeaf4b4a53b

    SHA1

    984c811b7e4ee4b2aeb0265555189462358bcfd9

    SHA256

    db65a92a0e13880ee490fc06f699161da7d34377ff03a269c41c5287efe768ee

    SHA512

    f2ffb82238c5e6fbc847186b2b34e2de67e0f3855a9064aa69bd3c17419bc0e7281044ed83ccd754290c2e8271ce3f953116ea7da137933c3a2c19cd63e18161