Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
Mir is fad.py
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Mir is fad.py
Resource
win10v2004-20240508-en
General
-
Target
Mir is fad.py
-
Size
45B
-
MD5
889630798bd2f015b99aa5ad9a9ae6c4
-
SHA1
4bee6407cf2f9e56636f864b0e5b046c95388163
-
SHA256
58027e4baebf28c2469f223466210b0dbb9f168af438a18c7aca9f94d7471855
-
SHA512
ec8c80862953f018a0fd53609974d38e54c8965cedf7641da17abbd015c31399f0d024b1efccda13b996819478cf1edb7a6027a6c23a000cf4cf2faa6e27d963
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2660 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2660 AcroRd32.exe 2660 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 856 wrote to memory of 2580 856 cmd.exe 29 PID 856 wrote to memory of 2580 856 cmd.exe 29 PID 856 wrote to memory of 2580 856 cmd.exe 29 PID 2580 wrote to memory of 2660 2580 rundll32.exe 30 PID 2580 wrote to memory of 2660 2580 rundll32.exe 30 PID 2580 wrote to memory of 2660 2580 rundll32.exe 30 PID 2580 wrote to memory of 2660 2580 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Mir is fad.py"1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Mir is fad.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Mir is fad.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a3af85c952d1e5b76dc3dc4b5712ace3
SHA115528999733cf7643dc9a567d21a526ae7e9c4d0
SHA256437ab7bfb4cbf09c62fd67fa7600d854bb20a5e8ac5c7576952939f5426108f6
SHA512cf3a657034bf1d562d05e88c6fc69755597c5150abe473aff7d1df432aad4b92b34df04e165f3065be28d0c14a182859149a108f70d0d32f41103ce35be8ae0c