Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2024 00:57

General

  • Target

    Components/BlankOBF.py

  • Size

    5KB

  • MD5

    7a8c07085db6d780537154ba26a42a5e

  • SHA1

    0bb6856624884bf154be7cc8df52d3214dea7d9f

  • SHA256

    ca8445cd8593ff89d2a406e43fa114f612fe10835d80cb43b4341c390f8b5eb0

  • SHA512

    16d91226b929128c447ee04c00e9eede44e6a5daf9691a9d45ff645da053748594734268ae45a4521f0329bf8116ed16c149a9edfaf74d923e64ffec5271c706

  • SSDEEP

    96:Gr54cd62hK9FFZ48PuCQYBX5oQL6oUMOQcL:GP6Us4B8JoQLBsQcL

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Components\BlankOBF.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Components\BlankOBF.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Components\BlankOBF.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    a70e609335ba374cde87837a1960b782

    SHA1

    aaa48a8421bf0eec20a29e4a059cc4618d0a185a

    SHA256

    2657f6d078aa15ad079739521b2750a35babeaca97f9ea3e0dd0f9e2183cb5a7

    SHA512

    09ddb53d8d86e2a444274902a93c9ca153152f71efbb9c44ddd76ada719aff3c63b393a175b820e075ddf23aed60362cace26615eb13c325d99c052e50b094b2