Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2024 16:40

General

  • Target

    CollapseLoader-1.2.5/collapse/utils/API.py

  • Size

    1KB

  • MD5

    07b206f6837426548f6efa08da980596

  • SHA1

    18bfa282d88609fdf7eb8b4b1f017fc5bee6722e

  • SHA256

    9be083181aa66fe7ed42f1d505518300bb6a7b2d18005b52c4a2236cf3f5da84

  • SHA512

    c47e7d7728d8a7efde9858c5f70c5c93d9d35467c014f055a8136345a7f6ae4625b98d27681f55a6a432c477e45c26d0ddc442de5e2aa6a77aef46d5c02dd580

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\collapse\utils\API.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\collapse\utils\API.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CollapseLoader-1.2.5\collapse\utils\API.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    ea78f049bd3f2a2194555d9659d5ecc3

    SHA1

    a4b8c542e38263e7909110e1f246eb6590232d29

    SHA256

    282208dc95ab18556e65f9779c7389f765b16d197cd5f52bb5ac7f39dd4692fc

    SHA512

    19f8724acb356f739080fd735a200a1f36fbff14c5a1d9dc32f1d50415fadf2295094ec19a3b28b762c786fc5b31b1020552eed24d6854f3d540625fa2df5a01