Analysis

  • max time kernel
    3s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2024, 00:57

General

  • Target

    Components/stub.py

  • Size

    104KB

  • MD5

    094aaaa77f79893c5f53c05fbb7862de

  • SHA1

    782099a388b4796cd96434bceb9714960fa36bb7

  • SHA256

    999985a9d00858b7a007b68f004d4a5dd603f8984a187cb817f7adeb90cce10f

  • SHA512

    15aca84dab29f5e87d6bf38f79acda377f477ba4e61fa84d6a17771d2e7f528fe2e44f851b858c0b0c2b9077a58b5f57007fde6ae2b62bfaa07f8b45042bdcc4

  • SSDEEP

    3072:9eqOZ6qJnSAmVGn2kY4iajfmsD+ABFPAA2C4:sqOyWY4u0B34

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Components\stub.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Components\stub.py
      2⤵
        PID:2568
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Components\stub.py"
          3⤵
            PID:2664

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

        Filesize

        3KB

        MD5

        f8f1a1a16d2c2649454f904ca64748be

        SHA1

        ad44647e3efc00cbe8c04ca5b605162e525875fc

        SHA256

        2b6702d2025b7e37470e83fc83faec47673441809f749c21eb7f4500b920dca5

        SHA512

        7048244e271b6bb5892b8252404649c8284aa66e2bc70d75622bfc3c2ece2ae1e456502c4e1ee3894deec14c432180f52379d05199cf9b0fb6f72b06c7a3ed42