Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-04-2024 22:19
Behavioral task
behavioral1
Sample
Moon Predictor V2 (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Moon Predictor V2 (1).exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Creal.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Creal.pyc
Resource
win10v2004-20240412-en
General
-
Target
Creal.pyc
-
Size
28KB
-
MD5
370838c72bfe99c475b4a67a24d2b989
-
SHA1
3b6373953963700a546dcc5d3d7a0e31c78ddb93
-
SHA256
3e9335ab8087295cf9d53b203d0003970ad18578b8bf57cbdef37840c120ea32
-
SHA512
27c8679b87bb181de9377514f85550e8ea1d0146bc872ec05aeca2dda91241bdbdcf9606be05170467619e568d0c6d93763ff7738ebc01d84952b32f8fa628b3
-
SSDEEP
768:rxbnr6B2MgyUI4AC9Vq71Qmf6AgehmSsLrrFHVFHMHCWn:1brbtvSCAgeR8HMHPn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1208 AcroRd32.exe 1208 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2600 1948 cmd.exe 29 PID 1948 wrote to memory of 2600 1948 cmd.exe 29 PID 1948 wrote to memory of 2600 1948 cmd.exe 29 PID 2600 wrote to memory of 1208 2600 rundll32.exe 30 PID 2600 wrote to memory of 1208 2600 rundll32.exe 30 PID 2600 wrote to memory of 1208 2600 rundll32.exe 30 PID 2600 wrote to memory of 1208 2600 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Creal.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Creal.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Creal.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b11133fa7e63c9f1f861c5249abf8f63
SHA12a1cbdb8240789af3056224d4d99a659b9c72ea3
SHA256a6ec168b79e33703f8b2b0ee931db9c65c1bd0f3f258f9f9783a713d12691ed7
SHA512b4ac67e37fd256d888de95a72cd6764424d303df1cb2575969ce228d4b134419347f40829f74d5454d6e14e34d6ef1c9e5dba4d8514b2a2a0835346b3d71c54b