Resubmissions

14/06/2024, 16:37

240614-t4391ascpr 7

14/06/2024, 16:32

240614-t2ehvssbqp 7

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 16:32

General

  • Target

    yea.pyc

  • Size

    12KB

  • MD5

    4e48d5d5eb1b064418a73bbae21f75ad

  • SHA1

    e69c1f71930159e5c89cbed6e9f9d716720f37eb

  • SHA256

    6d7d1720e0529edcac2588a1469599df12cf6016b15702e3890139e357c2c304

  • SHA512

    a5483f9f877c4b367e7fa177c1b3c33d2c40fd9df1302344328d1f38304af79607429ad76b2997e81efc11207729c55465c7db07b953af83964ef2a16d9b8529

  • SSDEEP

    192:x/9xv5G8EYe5s5lXM0LUbkDIs/J4OS0KYyjhUV:dv5GGeCrvUbTsKbThg

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\yea.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\yea.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\yea.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2388

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          6166a17851d00374d4d298c1b79ad96c

          SHA1

          a9dcd579080412b3e7733faefd639d2692d3c25f

          SHA256

          45a9c3c5a80ba2673954f4751dce3cc58c3aeece8a31805d142da55a0b1862d6

          SHA512

          60e6fd891964bd43e4073844f82fa1c4644a6c89c5bafd4adb4963a0413e0c422e50958487d711209d13e6b6cfc24beab31d186921bd32db7afd572e7c87a15c