Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06/06/2024, 16:40

General

  • Target

    CollapseLoader-1.2.5/collapse/utils/RPC.py

  • Size

    1KB

  • MD5

    9aa9380b760e117efb4255b192d625ef

  • SHA1

    3661fa6f768e73069df345f8ebc5c707d58b2fe5

  • SHA256

    8e58c9d2a771cceff74e839575f5ce934b7180d7969acc311439a2c60f3c6858

  • SHA512

    d58ad82bf266ec8208621ce7dfb761dedb18fc26ff99385f06122b0011e5b38910c573e008eb8626b7ed32eced652d31fc98fdea2628a1e95ecad97914528839

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\collapse\utils\RPC.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\collapse\utils\RPC.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\collapse\utils\RPC.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    46ed611456bd7db5fecfb53b303042b9

    SHA1

    a96c0fc7cd4928fb1064db87a7479024ccdb99a4

    SHA256

    e47d238d3489440f9fab96bdb96a1a77a4d04aa1f44cb57111b74bc9aa24a353

    SHA512

    ed2319e23ec9c8982d08a7fb57485ea50979b52268362ff20d248d1c6fdce34f2b40a5ea85dcceaab824a77d253a69d828e2461f28205a832e6943c3ea23a110