Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 18:14
Behavioral task
behavioral1
Sample
hacn.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
hacn.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
11 signatures
150 seconds
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240412-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
main.pyc
-
Size
433B
-
MD5
312dc04abe8390eccc040ae951b7af5f
-
SHA1
6e47cc6d90ab6b101b1c042c6bb317c3e86ca0df
-
SHA256
304fb7638320868400d88a6834fc74fbe88aaca985197c1c8527a9a1ce5f24db
-
SHA512
b91a818687a3a55f4d6ea6f81ed779b7a9429a05f2a70f93f113c0742a2abae32e31eef2d0d62aa25a011c3b66005e4e696e0516aef140a2951fd13c51037dc2
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 2044 wrote to memory of 2848 2044 cmd.exe 29 PID 2044 wrote to memory of 2848 2044 cmd.exe 29 PID 2044 wrote to memory of 2848 2044 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
PID:2848
-