Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 00:16

General

  • Target

    Netti-Nuker-main/config.py

  • Size

    184B

  • MD5

    609deb87ad4014e5bb705700fee4de6a

  • SHA1

    6864320e3cd154b3daf5b3ca65bf45a6d7b5bd14

  • SHA256

    95c40f3aa689a427284f977bd2c229e816dea97719e6f72a113db3c4e1b5d1cf

  • SHA512

    9fd35584b8ab965463a06e170ca274b4331568d7f12ef55d7c6b4a54582d6d1af787654de71249e22e32e6273c40fe08fc403a9fee17f594c2e460e5f81f17d8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Netti-Nuker-main\config.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Netti-Nuker-main\config.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Netti-Nuker-main\config.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          bed2d7b21801e61aaf150c5d45c763d2

          SHA1

          a053b535856becc7ee488d5d8a4d5867b96a1200

          SHA256

          6b1d5e60f8e021f64ff84944f04ba0e02be96024c2ef1a234666df2742019c20

          SHA512

          bb70ca37829e375dfa7c95eafff9955c0e07b0c7f5de2a15ae8664ee5671d04618c92446aaca41dd7ef9ae9433ae16917e9fa9e85e0fcdab8420582412cc4d8c