Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 17:23

General

  • Target

    Stub.pyc

  • Size

    799KB

  • MD5

    b83723d9ba3e5e2b477debe68a742f44

  • SHA1

    95ccea42491d08d975a7f93ce155bc3fd5649555

  • SHA256

    60e8697cfca7d2553b72d866e7e2b606e85148b91f340545ddec23d3fbffcc24

  • SHA512

    1e9c19f28b053274312354dea5feadacbfdc5ca0863f3e920939fd2bd947df5e0c5d320cfeaf4fe295334048c3f3a28607973887fef6a9ab11323d4a310209ae

  • SSDEEP

    12288:fNMfhPLKX/8JW9tZzzYy7JwZEs7Fm5Fr/mWZ71sWS7rnB+xJCRjI6kkZwyyehL:68XWWjZzzBuR+F7RgWSXBAKEk6EL

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    a6b86902d5fc59c1dbf40208e21e016b

    SHA1

    99c03420ae06f91ee33caa88299b60af1746fe75

    SHA256

    e301bebdf01aceca0ca738a6703b9e978329721256b626ed2d07874e14542620

    SHA512

    3b7544c51e822cf8e10e384baca5f6960979f13b32a31a5a245bd07923f58cdd69e51b563c8332a4faf6ed5523739f6f069508cd132be06e4a4b106f792afdc1