Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    08-06-2024 14:13

General

  • Target

    build.pyc

  • Size

    64KB

  • MD5

    40c03899b664e90df6e9c2db8bd3471a

  • SHA1

    395b49a0410a25a5d09870b6f394ebb3a9a62b7f

  • SHA256

    f82d7ed28482ec77cb92635fe90a70959394a4cc6fa29d0fac5d0e3c062b9455

  • SHA512

    2b678035641d0661d74d893746d6e0a5a99987ca60666c7500f755f2b59793b2ae3477f02726a35d4d803ca25b8ffb5903d85f28095366b04e7785b5da949cc9

  • SSDEEP

    1536:7CrQqe+0Ql9pObo8BHWftlx7HFHOW98VgeOR2eP:7CrYbo8B2VlxTVHMgeORH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\build.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\build.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\build.pyc"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads