Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 11:34
Behavioral task
behavioral1
Sample
WindowsProcessHandler.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
WindowsProcessHandler.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
blxstealer.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
blxstealer.pyc
Resource
win10v2004-20240508-en
General
-
Target
blxstealer.pyc
-
Size
65KB
-
MD5
51ecf8f5fba0aeb23e48b8add0e49185
-
SHA1
f6459096cc5256907bc6c1928a658112eb7a4841
-
SHA256
02bb136818b3521667b447c0e46369324cb92487298654e235900f0eb56cfe30
-
SHA512
acfedbb6e2a5c8b667af5ae53e4b44ec0267dca1f7d7ac73e3468002993ec4c1091a6c807872d927b840a15c322346609176843f6df6a5a02cc3d0488df85ba1
-
SSDEEP
768:Mmd+ezrx+gRAwveI+aMXu1qFBoXwZukfyzbUbIknwEziuvfZS4/QmGVOwxAxxF3n:xdjzr7RAwMuHIyzI/ntPZS4/QmGCxbnX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3044 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3044 AcroRd32.exe 3044 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2776 1640 cmd.exe 29 PID 1640 wrote to memory of 2776 1640 cmd.exe 29 PID 1640 wrote to memory of 2776 1640 cmd.exe 29 PID 2776 wrote to memory of 3044 2776 rundll32.exe 30 PID 2776 wrote to memory of 3044 2776 rundll32.exe 30 PID 2776 wrote to memory of 3044 2776 rundll32.exe 30 PID 2776 wrote to memory of 3044 2776 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\blxstealer.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\blxstealer.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\blxstealer.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55d17785634d312d727842710c4c26c82
SHA1543a0b0ed669405e343f9077a6c9adfb0e4c1b43
SHA25634cf1be2aab3606a0de0cca20bdd476ec4d3022687e25a21487116023712f598
SHA51260fbc896c24014b67c71f29f0407264f7eb6b46d3fbfc268c5d1bd82aeb1bafa7e0fa7db8467129cabd46c4b84af9f97bd26940901997fa345db9e4255bff0a5