Overview
overview
10Static
static
1TT ViewBot...sts.py
windows7-x64
3TT ViewBot...sts.py
windows10-2004-x64
3TT ViewBot...xie.py
windows7-x64
3TT ViewBot...xie.py
windows10-2004-x64
3TT ViewBot...ent.py
windows7-x64
3TT ViewBot...ent.py
windows10-2004-x64
3TT ViewBot...rt.exe
windows7-x64
10TT ViewBot...rt.exe
windows10-2004-x64
10TT ViewBot...tup.py
windows7-x64
3TT ViewBot...tup.py
windows10-2004-x64
7Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
TT ViewBot v2.0/Data/Lists.py
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
TT ViewBot v2.0/Data/Lists.py
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
TT ViewBot v2.0/Data/ScrapProxie.py
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
TT ViewBot v2.0/Data/ScrapProxie.py
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
TT ViewBot v2.0/Data/UserAgent.py
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
TT ViewBot v2.0/Data/UserAgent.py
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
TT ViewBot v2.0/bot_start.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
TT ViewBot v2.0/bot_start.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
TT ViewBot v2.0/setup.py
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
TT ViewBot v2.0/setup.py
Resource
win10v2004-20240419-en
General
-
Target
TT ViewBot v2.0/Data/UserAgent.py
-
Size
1.0MB
-
MD5
0c9b29e6b8291144a8a1c7b190accbe5
-
SHA1
a5946876fb6de43a28c9b3d3b783c755f74f41f1
-
SHA256
8ec04b593bbf03b344809ebca690dcec7bc082bccd0e28d3b4931b371ab044c9
-
SHA512
cc8ad93051da8b447064d4c3dbaab624b8fa4516874358a1dfe2d52ac03a87f104b6cae8b036c42c87c7d9b1946138d9a0f4f7f5ed2db62b0a771901e1ec5cfe
-
SSDEEP
384:UKxzhaSY5IiEgeBLPxKQheqwF3zdU49rdobwjkH6g6QcOHcoR8AnaREHszt3Y3fO:e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2632 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2632 AcroRd32.exe 2632 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2536 2460 cmd.exe 29 PID 2460 wrote to memory of 2536 2460 cmd.exe 29 PID 2460 wrote to memory of 2536 2460 cmd.exe 29 PID 2536 wrote to memory of 2632 2536 rundll32.exe 30 PID 2536 wrote to memory of 2632 2536 rundll32.exe 30 PID 2536 wrote to memory of 2632 2536 rundll32.exe 30 PID 2536 wrote to memory of 2632 2536 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\TT ViewBot v2.0\Data\UserAgent.py"1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TT ViewBot v2.0\Data\UserAgent.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TT ViewBot v2.0\Data\UserAgent.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57ea071e6e2000a8389125745b702993d
SHA13ad3cd64fdfa16c8dfdbd60e4d5e759c1afd9d44
SHA2560050ea331c7b0cf9f1c2bec4b9b6ad190932a0aa7ee1e9091030b20a987c0795
SHA5129836d8e08306d324b3ba65f321425f116db4c3aa52e417d3ce3d7c8bb7f8359b2ad2e4027d5af81da2335aa842b28c1cc5b47b4235afe45523c383035c71091e