Resubmissions
20/04/2024, 09:30
240420-lghqsaeb4t 720/04/2024, 09:24
240420-ldceladd77 720/04/2024, 09:23
240420-lclxmsea21 7Analysis
-
max time kernel
19s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 09:23
Behavioral task
behavioral1
Sample
vacuum_168a3a7.zip
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
vacuum.exe
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
vacuum.pyc
Resource
win7-20240221-en
General
-
Target
vacuum.pyc
-
Size
31.0MB
-
MD5
d359b3ae555f033cdebc9f938068c34d
-
SHA1
ef54f15af657acf3f41d2f5b11533a96ad687790
-
SHA256
8642d5f7083d553987208e1bb0ce46192021d63e831ca8e02366421929e3c8c6
-
SHA512
1731ab154e4d9d9701d9de6467fcbef560e5b1df7ebb031e0ea93d10db3c00b8b02f5c0e60b664ad04fbc62f47680e72463e0133aee0e82db2d260e63d141715
-
SSDEEP
196608:rzk0jcYvOq4ARWAGHPiROYx6LavvVIQm9ae2PP/+wl3+9hHAmfNeRLpfPI/:rzkfq4Akvi4Y4aXjFesH+wlGlgi/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2400 AcroRd32.exe 2400 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2688 2588 cmd.exe 29 PID 2588 wrote to memory of 2688 2588 cmd.exe 29 PID 2588 wrote to memory of 2688 2588 cmd.exe 29 PID 2688 wrote to memory of 2400 2688 rundll32.exe 30 PID 2688 wrote to memory of 2400 2688 rundll32.exe 30 PID 2688 wrote to memory of 2400 2688 rundll32.exe 30 PID 2688 wrote to memory of 2400 2688 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\vacuum.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\vacuum.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\vacuum.pyc"3⤵
- Suspicious use of SetWindowsHookEx
PID:2400
-
-