Analysis
-
max time kernel
129s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 08:46
Behavioral task
behavioral1
Sample
tbk_1.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
tbk_1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
tbk.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
tbk.pyc
Resource
win10v2004-20240508-en
General
-
Target
tbk.pyc
-
Size
3KB
-
MD5
d8b7458a5a3348f1c80114e6fd6d5169
-
SHA1
6ceb929dbd6ee5aa98e31011caa164e02a5e282b
-
SHA256
2a96c8523b2c46053758d516847a193f82c7ea42bba62a67225eb86b36e1898a
-
SHA512
89cca90cadf572cebbdfb57b7a7a3f5c7c9cc6acfdc5f2391db377dc7e34eedc7f3a0ca2fb91e6ce455ca087d6d30fba7cb4edf53fef006630b34081830a1405
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2640 AcroRd32.exe 2640 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2532 2456 cmd.exe 29 PID 2456 wrote to memory of 2532 2456 cmd.exe 29 PID 2456 wrote to memory of 2532 2456 cmd.exe 29 PID 2532 wrote to memory of 2640 2532 rundll32.exe 30 PID 2532 wrote to memory of 2640 2532 rundll32.exe 30 PID 2532 wrote to memory of 2640 2532 rundll32.exe 30 PID 2532 wrote to memory of 2640 2532 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\tbk.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\tbk.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\tbk.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b24b10644046f59216547f6d9dc1d724
SHA1c7bf6f8e957feff10a8069c78404100d28d96575
SHA256cf3767da6063cf1624491cbfa754c545a06368d287367895b01412c859c3e894
SHA512014795f1fe4b3732bd2e18eeeef479d49df9008800efad4828791ed7db9503723b9bbdf7229f2f488958301c93c6c0b0a3f5e6eae1e2811c09687277529283c9