Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2024, 19:49

General

  • Target

    loader-o.pyc

  • Size

    324KB

  • MD5

    61aff090d88a0356db35e5131817049d

  • SHA1

    d6074330e94897fcf5be2a9262c5f42a5883ef00

  • SHA256

    b612b7e7d2508a7f7e0a2635886becc78219bbc2ddd2172e71488c3076f97cdf

  • SHA512

    299dd2d737e01cd3920fcbf70c57a0542b191f1d5dda038be1202cb8cb8d38beb2f19e58a4a89f45eea9ad362c660e68ce389b158e58d63b4c1952be8b6ee529

  • SSDEEP

    1536:6vU+zT3mNV9xyxECbr1qzcKSLC7oieram1demu+EaCGysFCHqxo4CbV66JnyqyKL:6vUm3Chn/sPYHZd5/altvcdh

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\loader-o.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\loader-o.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\loader-o.pyc"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2624
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2880

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

            Filesize

            3KB

            MD5

            901af37a28bb1ac5d9e3e6f91770e27b

            SHA1

            1a98ac18375d6775e619b1c7e57f4d7274db5492

            SHA256

            4fa9a88fa7e079443e9e5c4290f0e1ab568c9cf0b154f552b535c5808a3577a6

            SHA512

            4de64283063566a55c17776ad79ce1d1ec143e5a32d0cde5638ecae4250ddcdc5726c01278abc12cfe42eb21d7bc09491b8a4f301a837a9e38409617818cb481