Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 08:36
Behavioral task
behavioral1
Sample
Requirements upwork.scr
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Requirements upwork.scr
Resource
win10v2004-20240508-en
General
-
Target
Requirements upwork.scr
-
Size
699.6MB
-
MD5
1cbf33e0f9964d14cc107236d8060972
-
SHA1
bd7052b3f20a83ed7ce837030d7aee6b1150781a
-
SHA256
b7615563fc08671d442b6f8102eeb61f5058f75821bac5f701385f7c123d7fa5
-
SHA512
1042f8ee6b23000d55082af3061a8559c266302d5a72eb35041d33a090ec4e70850f7d55df3c3463478d40d0a17f4a1834d9e72a59829041540898d6b4bba63b
-
SSDEEP
393216:fM07b4unYmNXdJu4LTYi7dRcogr6+7QJhrrXZEwCz:fNIunb9bJRRgrWXZEw0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pythonw.exepid process 2540 pythonw.exe -
Loads dropped DLL 2 IoCs
Processes:
Requirements upwork.scrpythonw.exepid process 1500 Requirements upwork.scr 2540 pythonw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2660 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 2660 AcroRd32.exe 2660 AcroRd32.exe 2660 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Requirements upwork.scrdescription pid process target process PID 1500 wrote to memory of 2540 1500 Requirements upwork.scr pythonw.exe PID 1500 wrote to memory of 2540 1500 Requirements upwork.scr pythonw.exe PID 1500 wrote to memory of 2540 1500 Requirements upwork.scr pythonw.exe PID 1500 wrote to memory of 2660 1500 Requirements upwork.scr AcroRd32.exe PID 1500 wrote to memory of 2660 1500 Requirements upwork.scr AcroRd32.exe PID 1500 wrote to memory of 2660 1500 Requirements upwork.scr AcroRd32.exe PID 1500 wrote to memory of 2660 1500 Requirements upwork.scr AcroRd32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Requirements upwork.scr"C:\Users\Admin\AppData\Local\Temp\Requirements upwork.scr" /S1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Roaming\Programs\WinRAR\pythonw.exe"C:\Users\Admin\AppData\Roaming\Programs\WinRAR\pythonw.exe" /S2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2540
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\Temp\Requirements.pdf"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5401ddc298dbd5aa81e1efd876371abe1
SHA1583a28595771597be583bf0cc0ff90a814ba0a36
SHA256ae663a4b2d98b4beb4e91afcb645bc2d15a1545f8b07e1e4b66f7b42e67d0d76
SHA512ef9878b46f77050a576a470e97fa920cdbd6aaa2e06820e2659324c0e6b419b533154c9e581f8b5b6c9d898ec17efd56442bcce7818f07754a6d6867f8752092
-
Filesize
94KB
MD59a4cc0d8e7007f7ef20ca585324e0739
SHA1f3e5a2e477cac4bab85940a2158eed78f2d74441
SHA256040d121a3179f49cd3f33f4bc998bc8f78b7f560bfd93f279224d69e76a06e92
SHA51254636a48141804112f5b4f2fc70cb7c959a041e5743aeedb5184091b51daa1d1a03f0016e8299c0d56d924c6c8ae585e4fc864021081ffdf1e6f3eab11dd43b3
-
Filesize
717KB
MD5720b78ca59dbb0e1b885f47b9c4eebd3
SHA198629bc8c27329023931d158d2ab879e8136b5ff
SHA25673300eda96e39870895468cf7a7b90616b37d5d7673671c89db1776c192ed2be
SHA512ee22206441b41881acbae939dba2f4269e652782ba485963f81d3ae2aedd3838bba2a673de502a367cdc5f1a8c33a08e120495a473d617f2ec049fa5f0be17ac
-
Filesize
4.3MB
MD58fbbe41173ae011a717c706f25d06121
SHA1db35f1d1a0916cc0732b9747bd67a37e827440aa
SHA256ccd635f18a955d0d6bec012be96de876bb2009ff522c3457df40792405637a5a
SHA5128a17ecd7545ccee3bba62df2c5a00b839f60e0009fa55d9c9d8cc962349a501c618d65f83de2a977bda9b4368224f6ea89a881478d58fa4b68a9891b998d985a