Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 14:34
Behavioral task
behavioral1
Sample
wanyria.cc/MadeInHeaven.py
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
wanyria.cc/Wanyria loader.py
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
wanyria.cc/libaries/RUS.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
wanyria.cc/libaries/engine/fagality.dll
Resource
win7-20231129-en
General
-
Target
wanyria.cc/Wanyria loader.py
-
Size
1KB
-
MD5
61c09239da3d9e24715be5708034c035
-
SHA1
34f48c8334d465f921d0a8228a6c7bd391272098
-
SHA256
b2dcb2d067742e926f63f9f70a1d1940e41d56c96d5ec0a95545a2791919a0b3
-
SHA512
32fb26a9a732e9af2609cb99019f5eb59bd13f1bb1f95c8fb07e9c9c46afb8693bfd5dc49f594d982d978cf96f344e8bd393f5daa09ed7f1f6beb862a9b19dc4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2420 AcroRd32.exe 2420 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1268 wrote to memory of 2604 1268 cmd.exe rundll32.exe PID 1268 wrote to memory of 2604 1268 cmd.exe rundll32.exe PID 1268 wrote to memory of 2604 1268 cmd.exe rundll32.exe PID 2604 wrote to memory of 2420 2604 rundll32.exe AcroRd32.exe PID 2604 wrote to memory of 2420 2604 rundll32.exe AcroRd32.exe PID 2604 wrote to memory of 2420 2604 rundll32.exe AcroRd32.exe PID 2604 wrote to memory of 2420 2604 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\wanyria.cc\Wanyria loader.py"1⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wanyria.cc\Wanyria loader.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\wanyria.cc\Wanyria loader.py"3⤵
- Suspicious use of SetWindowsHookEx
PID:2420
-
-