Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
submitted
12/05/2024, 14:34
Behavioral task
behavioral1
Sample
wanyria.cc/MadeInHeaven.py
Resource
win7-20240508-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
wanyria.cc/Wanyria loader.py
Resource
win7-20240215-en
4 signatures
150 seconds
Behavioral task
behavioral3
Sample
wanyria.cc/libaries/RUS.bat
Resource
win7-20240221-en
0 signatures
150 seconds
Behavioral task
behavioral4
Sample
wanyria.cc/libaries/engine/fagality.dll
Resource
win7-20231129-en
2 signatures
150 seconds
General
-
Target
wanyria.cc/MadeInHeaven.py
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2724 2984 cmd.exe 29 PID 2984 wrote to memory of 2724 2984 cmd.exe 29 PID 2984 wrote to memory of 2724 2984 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\wanyria.cc\MadeInHeaven.py1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wanyria.cc\MadeInHeaven.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2724
-