Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 20:20
Behavioral task
behavioral1
Sample
MOD.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MOD.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
MOD.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
MOD.pyc
Resource
win10v2004-20240426-en
General
-
Target
MOD.pyc
-
Size
108KB
-
MD5
a05f3694850662afda9f8ab514eb86d8
-
SHA1
36b4d9e61b72acc2f974e2c88b3577175efacd79
-
SHA256
1b7527cdf69e2a8737d1307e419eaace03cb58a7a277ac55e49214163285441c
-
SHA512
f29ebe01c500cad0a6d595e8cffb7a2625b785dd01b39bfac1ed504ee9de544c4f98ca91476cc5f3e75fbad5686fee5dd5b46b414e2b51b258048208685155b1
-
SSDEEP
1536:vLIEz50sNreT20s9Zljay5YLDyklsyH4gQVFuuE6dKqGlsXOqthWUBW3IIIwYlIy:UU0sNrOT1lNSF06eqthWSWYT+zVw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.pyc rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2456 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2456 AcroRd32.exe 2456 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2516 2436 cmd.exe 29 PID 2436 wrote to memory of 2516 2436 cmd.exe 29 PID 2436 wrote to memory of 2516 2436 cmd.exe 29 PID 2516 wrote to memory of 2456 2516 rundll32.exe 30 PID 2516 wrote to memory of 2456 2516 rundll32.exe 30 PID 2516 wrote to memory of 2456 2516 rundll32.exe 30 PID 2516 wrote to memory of 2456 2516 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\MOD.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MOD.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MOD.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51a65e381e91cba76f03d3f2f9deee603
SHA197e94aaa2fdc1f19c548b92366164e52b12939fe
SHA2567c81372a7528719d072e239d939de66867c7a59262705ed3b9b8b760ce2e8b5f
SHA512b0d1134706d9642b3b7c507a8cb7bc0b158c2b30d79b5b29a395e5b9a0db61c69fbf52c9626a324423217c850ea07374708125e3bd935861b70d81dfe5678e64