Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 09:38
Behavioral task
behavioral1
Sample
AV-3.scr
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
AV-3.scr
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
AV-3.scr
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
AV-3.scr
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
ftpcrack.pyc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ftpcrack.pyc
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
ftpcrack.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
ftpcrack.pyc
Resource
win11-20240412-en
General
-
Target
ftpcrack.pyc
-
Size
31KB
-
MD5
7dec2a4693aff97a3c69a1bb6ec1fc5e
-
SHA1
bda38c25002ed785261343c7e1e085e2fa01e977
-
SHA256
fbd502647a65b3d2b1d654be47073f375cb67d49cedd516b80516dbd9c4bcc63
-
SHA512
d735d3ddfa942392d6982eb20621e0301bdd62dd1e804d4240c18945f886ad2ea50378cd15ae8fadb9d38b70743ad3f2e2c8e3daa82988595460e18c8a8e60dc
-
SSDEEP
768:m64+MyRk4o7v8Q0xqhtzZlryFu1KGxf6POOUExMTpKUcc9dDObS:m64+Rji8FxqnZlryFQhh6PbUEK9Ks91H
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2700 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2700 AcroRd32.exe 2700 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2500 2988 cmd.exe 29 PID 2988 wrote to memory of 2500 2988 cmd.exe 29 PID 2988 wrote to memory of 2500 2988 cmd.exe 29 PID 2500 wrote to memory of 2700 2500 rundll32.exe 30 PID 2500 wrote to memory of 2700 2500 rundll32.exe 30 PID 2500 wrote to memory of 2700 2500 rundll32.exe 30 PID 2500 wrote to memory of 2700 2500 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ftpcrack.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ftpcrack.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ftpcrack.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5254c8a2239b65a94cf0f8e76c5d3f6e5
SHA141496022315adb4fbf8cf014a4ff669b90c51ef1
SHA256b1005b013c99acdf7e337683afaf4dffb7af2d62feac9ef02f59534a68f0c61b
SHA5124e8957ec018b83608ead1d38f2c5d5c9bfbee3b1417a7461c1a83f1e93ead4a8dc6cdd6d4e45abc48251daf57f982a71a1eddbf12d75d2e0fc0fd834e6823b44