Analysis
-
max time kernel
1559s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240221-es -
resource tags
arch:x64arch:x86image:win7-20240221-eslocale:es-esos:windows7-x64systemwindows -
submitted
23-05-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
hola.py
Resource
win10-20240404-es
windows10-1703-x64
3 signatures
1800 seconds
Behavioral task
behavioral2
Sample
hola.py
Resource
win7-20240221-es
windows7-x64
4 signatures
1800 seconds
Behavioral task
behavioral3
Sample
hola.py
Resource
win10v2004-20240508-es
windows10-2004-x64
3 signatures
1800 seconds
General
-
Target
hola.py
-
Size
1KB
-
MD5
661bea8007107987e54e2a40af02026f
-
SHA1
a52a0edabe8a39870b7d5ce028352d3c18c09889
-
SHA256
bcacc3ebe1bbb561b803f0c027dee306aec44931b7f5a10f2d2befc2243d3b0d
-
SHA512
011bb54b2ee0298897d8c2e4c291714245157b41fe6d20ab4aa262ebe1a1103d18fb0b06d538ca43f7f52e4693fcccc97bc4d3d3c6407976229a243bd99f162f
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid process 2496 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1476 wrote to memory of 2496 1476 cmd.exe rundll32.exe PID 1476 wrote to memory of 2496 1476 cmd.exe rundll32.exe PID 1476 wrote to memory of 2496 1476 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\hola.py1⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\hola.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2496