Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 09:53

General

  • Target

    Mir is fad.py

  • Size

    45B

  • MD5

    889630798bd2f015b99aa5ad9a9ae6c4

  • SHA1

    4bee6407cf2f9e56636f864b0e5b046c95388163

  • SHA256

    58027e4baebf28c2469f223466210b0dbb9f168af438a18c7aca9f94d7471855

  • SHA512

    ec8c80862953f018a0fd53609974d38e54c8965cedf7641da17abbd015c31399f0d024b1efccda13b996819478cf1edb7a6027a6c23a000cf4cf2faa6e27d963

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Mir is fad.py"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Mir is fad.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Mir is fad.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    a3af85c952d1e5b76dc3dc4b5712ace3

    SHA1

    15528999733cf7643dc9a567d21a526ae7e9c4d0

    SHA256

    437ab7bfb4cbf09c62fd67fa7600d854bb20a5e8ac5c7576952939f5426108f6

    SHA512

    cf3a657034bf1d562d05e88c6fc69755597c5150abe473aff7d1df432aad4b92b34df04e165f3065be28d0c14a182859149a108f70d0d32f41103ce35be8ae0c