Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 14:01
Behavioral task
behavioral1
Sample
e1d2fa67832a62351e38b4d5c8da62fa.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e1d2fa67832a62351e38b4d5c8da62fa.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Password Generator.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Password Generator.pyc
Resource
win10v2004-20240319-en
General
-
Target
Password Generator.pyc
-
Size
1KB
-
MD5
207db50ab25fa2972a52a18252be04cc
-
SHA1
3504e02cc28fa2e6669641c5d3e99b56b8e02d46
-
SHA256
a156b0e7d9e7e119c4a9a13da67060ea2bcb0375c3534d38c0325bd09ddc6414
-
SHA512
04da8ef94184c5762c28dca67745cc423ddab33dd31f0830c3776c787d09ebf98b8b86d2631fc0cd2afeae54fad857bb211af5706546e4c1b5e9f250a074db91
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2768 AcroRd32.exe 2768 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 364 wrote to memory of 2848 364 cmd.exe 28 PID 364 wrote to memory of 2848 364 cmd.exe 28 PID 364 wrote to memory of 2848 364 cmd.exe 28 PID 2848 wrote to memory of 2768 2848 rundll32.exe 29 PID 2848 wrote to memory of 2768 2848 rundll32.exe 29 PID 2848 wrote to memory of 2768 2848 rundll32.exe 29 PID 2848 wrote to memory of 2768 2848 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Password Generator.pyc"1⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Password Generator.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Password Generator.pyc"3⤵
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5de6631fe3ec9452aba4df24bcab32ef9
SHA15dc72a158975c4c4386a28a0f5fc81c4f8c3449d
SHA2561e40feb655440d028a6f7d31dffc33deb587fa11d2c630cc59d1d28684e8e0d9
SHA51235b8b321e651049c1afcc213e08562189a2f86e803afc9e715c1445d98c0ec081f5cfc857dc3ab0d5c90721a46d34504b04797e6c8831c3dbb42dcca0170c4ff