Resubmissions

10-06-2024 12:39

240610-pvy7gawdlj 4

08-06-2024 23:35

240608-3ldfasah43 4

Analysis

  • max time kernel
    1561s
  • max time network
    1564s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 12:39

General

  • Target

    client.pyc

  • Size

    28KB

  • MD5

    2be0de430b690b7faa7bb47bd4b16a94

  • SHA1

    c53f1a8e9afc391c7dcbe03f18138778f6efac63

  • SHA256

    0cbfe1fd6c4d5c4c1eafff9ffe1b666214b5c3db3c6344e5ef1b5e99ad5e4f51

  • SHA512

    e83a7b0ee52742a0d92f03253706c54e584a33556af30992370aa205a0583c019d02a2c7631700261c32c435f309442ec3812b8d843ed550d3da1d591a0afbe0

  • SSDEEP

    768:VRqqwTq3qaqqLqqMOqPqqghbHqKgq7waqvZq3CqZqGq5qYqhqqkqtqATEqqBqxlU:VRqq2q3qaqqLqqMOqPqqghbHqKgq7waA

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\client.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\client.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\client.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
    Filesize

    3KB

    MD5

    d344a228562bfe52cc34b8c8901bed98

    SHA1

    78c65a26ee7fa5cda0fa3c3dd304c871e4f74510

    SHA256

    21a23217515d930a7a6a8da2ddf27413b23999557cae4cc71067b8711cf2a23d

    SHA512

    f40460e89f7a19e7895e6813258f78cf5467cb8a259580e309212f351ebb664ae7097234fc271381ce69272f6aaa6584478a5a5013c2da9a54d3950c416cade6