Resubmissions

14-06-2024 13:16

240614-qhxzbawckn 7

14-06-2024 13:06

240614-qcfg3ssamd 4

Analysis

  • max time kernel
    597s
  • max time network
    619s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 13:16

General

  • Target

    tools/python3/Lib/weakref.py

  • Size

    21KB

  • MD5

    0c6f82fb8421e6992aeaab71a587c9de

  • SHA1

    243dfa4f9e4bccb75996369f74d0925e4fa0dae7

  • SHA256

    6721c34ba3c404bf4a443890ed374b546a870c958935a6aa4fdf634876a5a980

  • SHA512

    73c764399c329600849f91ba4872bc2bb93b99133bd76dcf3b4440f8ff66fd17919420560b020ffa64baead8a3905e3b4cdb65de3a50846951edc3b0e32a466e

  • SSDEEP

    384:gJp8HzCblJPEwGmyZVPjY8c4jDyCYAym+TiH9QHORqQeIXjWi86wow0wHRegJn9d:g3EPOpRUBzSmOjJnCoWaDf3DjJnRKs

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\tools\python3\Lib\weakref.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\tools\python3\Lib\weakref.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\tools\python3\Lib\weakref.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
    Filesize

    3KB

    MD5

    f24b7a6aee30724beed101f6487f3520

    SHA1

    f921465fb2c7c37e0a63ebaa132997e837af2b72

    SHA256

    fdf7ba2a0c1bdb4c15e4474fa41ae9862c62cde59a39787c44e3b2dcff677eb4

    SHA512

    1538cd4aad5f2e8883be6e2c162a4c0211c51fa06fc0b084543c1e013e41fdbe9155b0275598e41e44f429c5266d2876310aebbcf821ae86cd972f1ab4c83a13