Overview
overview
6Static
static
1.runner/boner
ubuntu-20.04-amd64
1.runner/cosynus
ubuntu-20.04-amd64
1.runner/main
ubuntu-20.04-amd64
1.runner/pscan2
ubuntu-18.04-amd64
1.runner/run
ubuntu-18.04-amd64
6.runner/run
debian-9-armhf
6.runner/run
debian-9-mips
6.runner/run
debian-9-mipsel
6.runner/send_vuln.py
windows7-x64
3.runner/send_vuln.py
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-04-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
.runner/boner
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral2
Sample
.runner/cosynus
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral3
Sample
.runner/main
Resource
ubuntu2004-amd64-20240221-en
Behavioral task
behavioral4
Sample
.runner/pscan2
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral5
Sample
.runner/run
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral6
Sample
.runner/run
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral7
Sample
.runner/run
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral8
Sample
.runner/run
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral9
Sample
.runner/send_vuln.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
.runner/send_vuln.py
Resource
win10v2004-20240226-en
General
-
Target
.runner/send_vuln.py
-
Size
1KB
-
MD5
dbb01b6d40b0efa19bd887640685e3b6
-
SHA1
638108b2217b21843ba7f1c80a95f756e5e2310d
-
SHA256
6988f670c3cee552792797e7f0aea6e93516bf278b29d3ddce13cedb6c261f3b
-
SHA512
89149ce817b1c19c531c08e53aabe3964148ac24ccfbb56d323d3255db64f42f93ce4e0b213d996c6d84d4bb5f6930a74d3cccb9f467acbe86077071ab6ca03b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1972 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1972 AcroRd32.exe 1972 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2000 2364 cmd.exe 29 PID 2364 wrote to memory of 2000 2364 cmd.exe 29 PID 2364 wrote to memory of 2000 2364 cmd.exe 29 PID 2000 wrote to memory of 1972 2000 rundll32.exe 30 PID 2000 wrote to memory of 1972 2000 rundll32.exe 30 PID 2000 wrote to memory of 1972 2000 rundll32.exe 30 PID 2000 wrote to memory of 1972 2000 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\.runner\send_vuln.py1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\.runner\send_vuln.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\.runner\send_vuln.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD512defaf0c1f510a78f4dc742ba8f4b3b
SHA10eee5e50f19525c863d829778fe119bead6bc891
SHA25623fdf1fc2beee100baa236c09d1b2ab08380d1a5ac620e932076b5a68f4009cf
SHA51292efafce0b24e7964566ebfba8977a3888280f3ad5be9723fa3111757fdea2cd77322c1d5986b3b0def1b49710931197159e37d0b99bb11225561b80fcac27dc