Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 06:10

General

  • Target

    cffi/__init__.py

  • Size

    513B

  • MD5

    82e8d2b1149b5c3d7a023c0f412b3ab3

  • SHA1

    7e923425ad3edfb78dbecb4ae92d7edbcec4e5f8

  • SHA256

    b849f36979509dd47d9dcf1aaf5aa4ebf7283447f17e7e29034b163d583630ff

  • SHA512

    515b31d692c4e1b22ddfd079e01203eb5535810c317361b62b47a624ecdef4fe003c4bc86e5e4ef076fb2e20da8a9b5243dd98c71fedc80373649d0d38e628d2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\cffi\__init__.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\cffi\__init__.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\cffi\__init__.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8e38e2f7ecfabbda75ad1a1aed07c44c

    SHA1

    0086ebdff5de7462d70dacec141d070e96ff2051

    SHA256

    b80f0211141265b89ebfb364abe345b144dca4f46f9e99b459aceb0e0630d398

    SHA512

    ff996723a98cb8191fc3c09f04381de8990c3bedca7f4489a228ef68ab6c5b954381264a2b49b5d2f0be422927732c5655308f14c9785b25f7507939ba03f6f9