Resubmissions

03/05/2024, 20:03

240503-ysqa8aeb6z 10

Analysis

  • max time kernel
    1566s
  • max time network
    1573s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 20:03

General

  • Target

    depot_228990/MFGW.app/Contents/Resources/lib/python3.9/ctypes/__init__.pyc

  • Size

    16KB

  • MD5

    2e6244ee605b5301621ef62e37439338

  • SHA1

    920cc6463e1b57100ad5e5bedb66a6cc09492fa2

  • SHA256

    669999d4ba831c2f6b2c47db203f627c4b1120dc7f1ba1fc8694fb0d8f824365

  • SHA512

    0abea7dc9d1e427b92ea5cf477a2bbe48408f0e67b49df425115a692c44b482a4e2e61caf16be1b3811baeb38df89bb538d3defb9d38e0845713b9868de5f1d9

  • SSDEEP

    384:9J70jNVt0un6uCh1wgZKXwMkq3651Sk2v0eXMd0oZ:9JgZVCh+AfiR0Qi0oZ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\depot_228990\MFGW.app\Contents\Resources\lib\python3.9\ctypes\__init__.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\depot_228990\MFGW.app\Contents\Resources\lib\python3.9\ctypes\__init__.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\depot_228990\MFGW.app\Contents\Resources\lib\python3.9\ctypes\__init__.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    fa7b1726fd55d13daa13949ee2d55b1e

    SHA1

    c0e08d7e6424695a854979e4f929f5cc58e86dd8

    SHA256

    20b02938756a928e7a7f925cf92e9b19cf0423dc9ecb3464fb60bfd30c375fbc

    SHA512

    fde5566105c54b1d2bd78ea10840bd1cceba06ec1db160782b431fe13c46d792e6b846713379a726a31e0c4fd67f8225b76a8a971fc7273c2b89fd485f81de1f