Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 14:13
Behavioral task
behavioral1
Sample
builded.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
builded.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
build.pyc
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
build.pyc
Resource
win10v2004-20240426-en
General
-
Target
build.pyc
-
Size
64KB
-
MD5
40c03899b664e90df6e9c2db8bd3471a
-
SHA1
395b49a0410a25a5d09870b6f394ebb3a9a62b7f
-
SHA256
f82d7ed28482ec77cb92635fe90a70959394a4cc6fa29d0fac5d0e3c062b9455
-
SHA512
2b678035641d0661d74d893746d6e0a5a99987ca60666c7500f755f2b59793b2ae3477f02726a35d4d803ca25b8ffb5903d85f28095366b04e7785b5da949cc9
-
SSDEEP
1536:7CrQqe+0Ql9pObo8BHWftlx7HFHOW98VgeOR2eP:7CrYbo8B2VlxTVHMgeORH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2540 AcroRd32.exe 2540 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 840 wrote to memory of 2528 840 cmd.exe 29 PID 840 wrote to memory of 2528 840 cmd.exe 29 PID 840 wrote to memory of 2528 840 cmd.exe 29 PID 2528 wrote to memory of 2540 2528 rundll32.exe 30 PID 2528 wrote to memory of 2540 2528 rundll32.exe 30 PID 2528 wrote to memory of 2540 2528 rundll32.exe 30 PID 2528 wrote to memory of 2540 2528 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\build.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\build.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\build.pyc"3⤵
- Suspicious use of SetWindowsHookEx
PID:2540
-
-