Overview
overview
10Static
static
10AKUMA/__py...10.pyc
windows7-x64
3AKUMA/__py...10.pyc
windows10-2004-x64
3AKUMA/__py...11.pyc
windows7-x64
3AKUMA/__py...11.pyc
windows10-2004-x64
3AKUMA/__py...12.pyc
windows7-x64
3AKUMA/__py...12.pyc
windows10-2004-x64
3AKUMA/__py...11.pyc
windows7-x64
3AKUMA/__py...11.pyc
windows10-2004-x64
3AKUMA/__py...10.pyc
windows7-x64
3AKUMA/__py...10.pyc
windows10-2004-x64
3AKUMA/__py...11.pyc
windows7-x64
3AKUMA/__py...11.pyc
windows10-2004-x64
3AKUMA/__py...12.pyc
windows7-x64
3AKUMA/__py...12.pyc
windows10-2004-x64
3AKUMA/__py...10.pyc
windows7-x64
3AKUMA/__py...10.pyc
windows10-2004-x64
3AKUMA/__py...10.pyc
windows7-x64
3AKUMA/__py...10.pyc
windows10-2004-x64
3AKUMA/__py...11.pyc
windows7-x64
3AKUMA/__py...11.pyc
windows10-2004-x64
3AKUMA/__py...12.pyc
windows7-x64
3AKUMA/__py...12.pyc
windows10-2004-x64
3AKUMA/f.l.e.a.t..exe
windows7-x64
10AKUMA/f.l.e.a.t..exe
windows10-2004-x64
10Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 19:51
Behavioral task
behavioral1
Sample
AKUMA/__pycache__/banner.cpython-310.pyc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AKUMA/__pycache__/banner.cpython-310.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
AKUMA/__pycache__/banner.cpython-311.pyc
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
AKUMA/__pycache__/banner.cpython-311.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
AKUMA/__pycache__/banner.cpython-312.pyc
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
AKUMA/__pycache__/banner.cpython-312.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
AKUMA/__pycache__/ddos.cpython-311.pyc
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
AKUMA/__pycache__/ddos.cpython-311.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
AKUMA/__pycache__/deanon.cpython-310.pyc
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
AKUMA/__pycache__/deanon.cpython-310.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
AKUMA/__pycache__/deanon.cpython-311.pyc
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
AKUMA/__pycache__/deanon.cpython-311.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
AKUMA/__pycache__/deanon.cpython-312.pyc
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
AKUMA/__pycache__/deanon.cpython-312.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
AKUMA/__pycache__/get_ip.cpython-310.pyc
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
AKUMA/__pycache__/get_ip.cpython-310.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
AKUMA/__pycache__/mail.cpython-310.pyc
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
AKUMA/__pycache__/mail.cpython-310.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
AKUMA/__pycache__/mail.cpython-311.pyc
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
AKUMA/__pycache__/mail.cpython-311.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
AKUMA/__pycache__/mail.cpython-312.pyc
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
AKUMA/__pycache__/mail.cpython-312.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
AKUMA/f.l.e.a.t..exe
Resource
win7-20240611-en
General
-
Target
AKUMA/__pycache__/mail.cpython-310.pyc
-
Size
2KB
-
MD5
e13bee24600ddc20307276de275486ff
-
SHA1
5c27efcd59eba615ab2339513a6bac54e1924408
-
SHA256
cd19830c5a89e6db33a2b8427481359d699ded80bf819a5b217972a8fe38b2b1
-
SHA512
8dfa9a2e4f2a3266a8e83a194dc0fe7c3f7d2c5754aaa30a0a70daddad5c18f78ca11705b00973275bf5bbfa28b85c066dc86400e63dd5879208cb2ab63154c3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2716 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2716 AcroRd32.exe 2716 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2320 wrote to memory of 3068 2320 cmd.exe rundll32.exe PID 2320 wrote to memory of 3068 2320 cmd.exe rundll32.exe PID 2320 wrote to memory of 3068 2320 cmd.exe rundll32.exe PID 3068 wrote to memory of 2716 3068 rundll32.exe AcroRd32.exe PID 3068 wrote to memory of 2716 3068 rundll32.exe AcroRd32.exe PID 3068 wrote to memory of 2716 3068 rundll32.exe AcroRd32.exe PID 3068 wrote to memory of 2716 3068 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AKUMA\__pycache__\mail.cpython-310.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AKUMA\__pycache__\mail.cpython-310.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AKUMA\__pycache__\mail.cpython-310.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEventsFilesize
3KB
MD50d82ff0a0a880d82f3c0751bfedc8774
SHA1eefdf67c56f7f0ce5e1c7a9bdd17bc9e16e20aad
SHA256be945a0e1255937994c4feb9c48d497f518a29b277462930c25afabb0a43ff39
SHA512a204a171a0582af0b78f176ae0ee0a8a71be2c2d2c58c9ae5b458c5eca8a7d6423d3c969df63227fb4be44a66edef7b89da3dd8daefe840f17c761137aec1e58