Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 00:56
Behavioral task
behavioral1
Sample
loader (5).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
loader (5).exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
loader.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
loader.pyc
Resource
win10v2004-20240419-en
General
-
Target
loader.pyc
-
Size
67KB
-
MD5
6843981d50b58a543be8b54171fff324
-
SHA1
5dd782df82782c9ad5277d817de15c2dac895adf
-
SHA256
b791d45d65ce48596b9dc801e2964655901b03374755428ac00ed8eaa154f6d6
-
SHA512
3a74127a689fd64207dc2911488dc49b8280c47a7949e69f9e83587c1edf6fa9b74cb38ac39942bd49576db8c687aadc59c16cb54220934a7bac162e3395668f
-
SSDEEP
768:y2mfPySSEcm2M26Khssz6or+01N0gd4q30hE2LXTxlwvOLYsfPGMmgt0AnjEUnrO:y2YSEh0e6LBE/xcGPGMmgtF4qrc3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 AcroRd32.exe 2680 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2584 2184 cmd.exe 29 PID 2184 wrote to memory of 2584 2184 cmd.exe 29 PID 2184 wrote to memory of 2584 2184 cmd.exe 29 PID 2584 wrote to memory of 2680 2584 rundll32.exe 30 PID 2584 wrote to memory of 2680 2584 rundll32.exe 30 PID 2584 wrote to memory of 2680 2584 rundll32.exe 30 PID 2584 wrote to memory of 2680 2584 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\loader.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\loader.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\loader.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d5f91af007f033180542bd2c92f9590d
SHA11bb7bc205c3a3a2f48319bd56348c8f526e6aafe
SHA256d2dc10000a746536907c7e5c09b21d7484a2f8f357b3eade61ca49133199953d
SHA512784769ee57f9782c3b253e49e6a3a61acc09cf8773eaa671df2e07e315216f3017af9c3a8ea613d0e94c33fc4463ad528d8a3a717c0086626c2180286521faeb