Resubmissions

03/05/2024, 20:03 UTC

240503-ysqa8aeb6z 10

Analysis

  • max time kernel
    1558s
  • max time network
    1565s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 20:03 UTC

General

  • Target

    depot_228990/MFGW.app/Contents/Resources/lib/python3.9/copyreg.pyc

  • Size

    4KB

  • MD5

    c230208a8cb6c60dfaf9645d025420cf

  • SHA1

    f6c3bc477f1093d934d362bb2324212a2156d3b7

  • SHA256

    a556aa69410d75d8cf4658ad3a5566fb22d28c74bf5f5ce45d54d9bba04c408a

  • SHA512

    3dc6fdc08b55599c55e86e87c4c3b9a9f232574e65a92309ec65ae18281057a3dcc9429a125e1b8614d60edfbd9cef4f4702d3395cef5a36d927fb2ca4b103d9

  • SSDEEP

    96:HiiU3NlLHfjZN9xiOtktpErU2qsxbl4fqm5vJYHjmTvP+H3TPa:b6bHfBt2UP5WfhtJYHjmTn+H3TPa

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\depot_228990\MFGW.app\Contents\Resources\lib\python3.9\copyreg.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\depot_228990\MFGW.app\Contents\Resources\lib\python3.9\copyreg.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\depot_228990\MFGW.app\Contents\Resources\lib\python3.9\copyreg.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    1ae7654b1fbea9f5236444d79ccb20dd

    SHA1

    febdfdfff6ac5b5d5e635ee3edc5ac2fd56ce172

    SHA256

    df8edd7352f7dd774a93f88749bf425f01dfcdd6b2395d36fb9c9042ed57068f

    SHA512

    7a7b10889831402297d66b83ffcf7c1586069e4ae1c03f955a1603741d87fec6b4b5dc854ed4ac85f7aa439f969aef8ed6c64072ad11d5862911b6f1bd99c02b

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.