Analysis
-
max time kernel
88s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Builder.pyc
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
Builder.pyc
Resource
win10v2004-20240508-en
General
-
Target
Builder.pyc
-
Size
261KB
-
MD5
88e7c431909e81ba2277549fc723c330
-
SHA1
cb56b68d13499c3918892f4edfbe3dfaa4de68d0
-
SHA256
8a8c154099668d750b23d09c398594572501382ac28c1605d164f7b745dbf499
-
SHA512
3fc3b4a9d7ceab2b4fd8855c5b05fe9df3add797ef3fa9b44e0c7ff03162358cfd1ce356e352f7cb4a89099b3bfd6f58103b53656b856daef5d5a4aeb03dcd31
-
SSDEEP
3072:6zDI4ykuQA8BnPZ05DTvtIM/zQ8J7sdd3:ixykuL8BnPW5nFIMrQ8Jwdp
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2904 AcroRd32.exe 2904 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2688 2944 cmd.exe 29 PID 2944 wrote to memory of 2688 2944 cmd.exe 29 PID 2944 wrote to memory of 2688 2944 cmd.exe 29 PID 2688 wrote to memory of 2904 2688 rundll32.exe 30 PID 2688 wrote to memory of 2904 2688 rundll32.exe 30 PID 2688 wrote to memory of 2904 2688 rundll32.exe 30 PID 2688 wrote to memory of 2904 2688 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Builder.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Builder.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Builder.pyc"3⤵
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5cad7c438c2ca97ad198a4d0de41450a5
SHA1039d5518715285b72dcd0490f21042ca3ca931bb
SHA2568ff8d85ab087d2a01e99e4366c97c021b3f2683112aec7673d5265ff44836150
SHA51266643f4f20da46d268b3f1425bed73b72e8eed74ba8114f566c3ee28180c5d140413e32389cc353c48f83c56c956e9c5a2d71dc52f9e11721d53d42e49405372