Analysis

  • max time kernel
    120s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 19:46

General

  • Target

    FrenniFazclaireAlpha-0.3.1-pc/lib/python3.9/__future__.pyc

  • Size

    4KB

  • MD5

    08d42ce57d4c079f976050586d0d44bc

  • SHA1

    d22d35f0a1d95ffbfda38385ba64b2686eeb159f

  • SHA256

    58e9d4577a45e253caf95fee0d446581b0caf0a3d3b08f4ab09868c56e53d264

  • SHA512

    ea428d0e6240337bc30e4110481b955db2deee23a3afa981f894dd13c3cb0194def39f60572fd549f1882521e02ed44d98448f86f718706f5d5a488f9b405376

  • SSDEEP

    96:Sg1NzUuGd+P2sKNwW8D2j82xnCg8Q/Ks/qN+Bj0ui:n4BRd8D1YCM/KsSN+Bj0ui

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\FrenniFazclaireAlpha-0.3.1-pc\lib\python3.9\__future__.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\FrenniFazclaireAlpha-0.3.1-pc\lib\python3.9\__future__.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\FrenniFazclaireAlpha-0.3.1-pc\lib\python3.9\__future__.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    51f6ebc89f3b697663371b8a2f1ad5df

    SHA1

    1bb7cf2cad37fd9d3f1f9a2d05296112cc062ba2

    SHA256

    68ca6ebcdf9366188255efe84cb51609caf7be114119fcf0b14e73c29e89a7c6

    SHA512

    a7365a0b1c812ac2b6da75509958753efcd8064ea826bc8cf93fb6ad68c18ce6d7efa31b82a010654a837ecbf2388adb2c31eeebe2cc8ee7a07000bf1967cb59