Analysis
-
max time kernel
354s -
max time network
356s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 14:36
Behavioral task
behavioral1
Sample
MM2ccDuper.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
MM2ccDuper.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
MM2ccDuper.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
MM2ccDuper.pyc
Resource
win10v2004-20240508-en
General
-
Target
MM2ccDuper.pyc
-
Size
45KB
-
MD5
0b387ff8901029b9564bb4fca87f78dd
-
SHA1
13b6d427fcfb0fbb6974e61ebac6d89ee826a1a9
-
SHA256
8c3e48cde5fac76463e234d09eab47c4445977e7668084f89e8d36932006fe47
-
SHA512
c00ffd0ef502768ad1a597a76fe972202630f9284a1571d0bacb79ca7d43e3d84fcbd93096ff58720c8fa8046843cfad2d50b954035fbcc4ba78fee9d22c47d5
-
SSDEEP
768:n9JWeEmS6MSd2N/6hlJ99eaRoz/9LLUT/x26h6XRFvw1hE0EMqs6EDlhLx3k9:n9JWexSqdLhlJH5Cz/J0/xnh6BVw1hNm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\edit\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2868 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2204 2408 cmd.exe 29 PID 2408 wrote to memory of 2204 2408 cmd.exe 29 PID 2408 wrote to memory of 2204 2408 cmd.exe 29 PID 2204 wrote to memory of 2868 2204 rundll32.exe 30 PID 2204 wrote to memory of 2868 2204 rundll32.exe 30 PID 2204 wrote to memory of 2868 2204 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\MM2ccDuper.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MM2ccDuper.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\MM2ccDuper.pyc3⤵
- Opens file in notepad (likely ransom note)
PID:2868
-
-