Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-06-2024 11:34

General

  • Target

    blxstealer.pyc

  • Size

    65KB

  • MD5

    51ecf8f5fba0aeb23e48b8add0e49185

  • SHA1

    f6459096cc5256907bc6c1928a658112eb7a4841

  • SHA256

    02bb136818b3521667b447c0e46369324cb92487298654e235900f0eb56cfe30

  • SHA512

    acfedbb6e2a5c8b667af5ae53e4b44ec0267dca1f7d7ac73e3468002993ec4c1091a6c807872d927b840a15c322346609176843f6df6a5a02cc3d0488df85ba1

  • SSDEEP

    768:Mmd+ezrx+gRAwveI+aMXu1qFBoXwZukfyzbUbIknwEziuvfZS4/QmGVOwxAxxF3n:xdjzr7RAwMuHIyzI/ntPZS4/QmGCxbnX

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\blxstealer.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\blxstealer.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\blxstealer.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    5d17785634d312d727842710c4c26c82

    SHA1

    543a0b0ed669405e343f9077a6c9adfb0e4c1b43

    SHA256

    34cf1be2aab3606a0de0cca20bdd476ec4d3022687e25a21487116023712f598

    SHA512

    60fbc896c24014b67c71f29f0407264f7eb6b46d3fbfc268c5d1bd82aeb1bafa7e0fa7db8467129cabd46c4b84af9f97bd26940901997fa345db9e4255bff0a5