Overview
overview
7Static
static
3Visual V.3...V3.txt
windows7-x64
1Visual V.3...V3.txt
windows10-2004-x64
1Visual V.3/README.txt
windows7-x64
1Visual V.3/README.txt
windows10-2004-x64
1Visual V.3...V3.exe
windows7-x64
7Visual V.3...V3.exe
windows10-2004-x64
7eee.pyc
windows7-x64
3eee.pyc
windows10-2004-x64
3Visual V.3...on top
windows7-x64
1Visual V.3...on top
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 10:21
Behavioral task
behavioral1
Sample
Visual V.3/About Visual/Whats new in Visual V3.txt
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Visual V.3/About Visual/Whats new in Visual V3.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Visual V.3/README.txt
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Visual V.3/README.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Visual V.3/Visual V3.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Visual V.3/Visual V3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
eee.pyc
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
eee.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Visual V.3/visual on top
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Visual V.3/visual on top
Resource
win10v2004-20240426-en
General
-
Target
eee.pyc
-
Size
10KB
-
MD5
3c4c0a0f1a28e0bac74cf7325805411b
-
SHA1
a5cd404eea0ec988531c13dbb46090b21a5b3b86
-
SHA256
41a9ca2619456563ca7368c78ba5e49991b20ae024fd8e2423397afebdc88bd7
-
SHA512
7cb7cc571ce3012cb00a5f7a36216a666dc80e44c336bf05dc70d6a509c472eb3b77c8041cccc20fd1c9eb1b1334a8e3911566b7290a0e617dfddd72a5fe1dce
-
SSDEEP
192:YsxwIW+ybEgKflN7qToSvduxEJCpCi44WSCLLR+:YKg+ybmooWbaR44WSqR+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2684 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2684 AcroRd32.exe 2684 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2756 1960 cmd.exe 29 PID 1960 wrote to memory of 2756 1960 cmd.exe 29 PID 1960 wrote to memory of 2756 1960 cmd.exe 29 PID 2756 wrote to memory of 2684 2756 rundll32.exe 30 PID 2756 wrote to memory of 2684 2756 rundll32.exe 30 PID 2756 wrote to memory of 2684 2756 rundll32.exe 30 PID 2756 wrote to memory of 2684 2756 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\eee.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\eee.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eee.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d3146769baaa60f520923ec9ce8a644d
SHA10d7517e86c9011886a0bc3b8d942cbd497c62402
SHA256d24883eaa8d9475014e4ebea4485d34e4ef855c54572d6079186316a20a7972c
SHA512661421668d895b1efe58b010ae6646e026b357b221e30607b027cca06b8fa8f36937e5a9e7f5393064903e5e86825b936fe94d89013b7cbd55a1d7f147943634