Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 17:23
Behavioral task
behavioral1
Sample
Electron V3/ElectronV3.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Electron V3/ElectronV3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240426-en
General
-
Target
Stub.pyc
-
Size
799KB
-
MD5
b83723d9ba3e5e2b477debe68a742f44
-
SHA1
95ccea42491d08d975a7f93ce155bc3fd5649555
-
SHA256
60e8697cfca7d2553b72d866e7e2b606e85148b91f340545ddec23d3fbffcc24
-
SHA512
1e9c19f28b053274312354dea5feadacbfdc5ca0863f3e920939fd2bd947df5e0c5d320cfeaf4fe295334048c3f3a28607973887fef6a9ab11323d4a310209ae
-
SSDEEP
12288:fNMfhPLKX/8JW9tZzzYy7JwZEs7Fm5Fr/mWZ71sWS7rnB+xJCRjI6kkZwyyehL:68XWWjZzzBuR+F7RgWSXBAKEk6EL
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2036 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 AcroRd32.exe 2036 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2552 2152 cmd.exe 29 PID 2152 wrote to memory of 2552 2152 cmd.exe 29 PID 2152 wrote to memory of 2552 2152 cmd.exe 29 PID 2552 wrote to memory of 2036 2552 rundll32.exe 30 PID 2552 wrote to memory of 2036 2552 rundll32.exe 30 PID 2552 wrote to memory of 2036 2552 rundll32.exe 30 PID 2552 wrote to memory of 2036 2552 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a6b86902d5fc59c1dbf40208e21e016b
SHA199c03420ae06f91ee33caa88299b60af1746fe75
SHA256e301bebdf01aceca0ca738a6703b9e978329721256b626ed2d07874e14542620
SHA5123b7544c51e822cf8e10e384baca5f6960979f13b32a31a5a245bd07923f58cdd69e51b563c8332a4faf6ed5523739f6f069508cd132be06e4a4b106f792afdc1