Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2024 00:56

General

  • Target

    loader.pyc

  • Size

    67KB

  • MD5

    6843981d50b58a543be8b54171fff324

  • SHA1

    5dd782df82782c9ad5277d817de15c2dac895adf

  • SHA256

    b791d45d65ce48596b9dc801e2964655901b03374755428ac00ed8eaa154f6d6

  • SHA512

    3a74127a689fd64207dc2911488dc49b8280c47a7949e69f9e83587c1edf6fa9b74cb38ac39942bd49576db8c687aadc59c16cb54220934a7bac162e3395668f

  • SSDEEP

    768:y2mfPySSEcm2M26Khssz6or+01N0gd4q30hE2LXTxlwvOLYsfPGMmgt0AnjEUnrO:y2YSEh0e6LBE/xcGPGMmgtF4qrc3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\loader.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\loader.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\loader.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d5f91af007f033180542bd2c92f9590d

    SHA1

    1bb7bc205c3a3a2f48319bd56348c8f526e6aafe

    SHA256

    d2dc10000a746536907c7e5c09b21d7484a2f8f357b3eade61ca49133199953d

    SHA512

    784769ee57f9782c3b253e49e6a3a61acc09cf8773eaa671df2e07e315216f3017af9c3a8ea613d0e94c33fc4463ad528d8a3a717c0086626c2180286521faeb