Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/06/2024, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
WavePremiumCracked.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
WavePremiumCracked.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
loader-o.pyc
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
loader-o.pyc
Resource
win10v2004-20240508-en
General
-
Target
loader-o.pyc
-
Size
324KB
-
MD5
61aff090d88a0356db35e5131817049d
-
SHA1
d6074330e94897fcf5be2a9262c5f42a5883ef00
-
SHA256
b612b7e7d2508a7f7e0a2635886becc78219bbc2ddd2172e71488c3076f97cdf
-
SHA512
299dd2d737e01cd3920fcbf70c57a0542b191f1d5dda038be1202cb8cb8d38beb2f19e58a4a89f45eea9ad362c660e68ce389b158e58d63b4c1952be8b6ee529
-
SSDEEP
1536:6vU+zT3mNV9xyxECbr1qzcKSLC7oieram1demu+EaCGysFCHqxo4CbV66JnyqyKL:6vUm3Chn/sPYHZd5/altvcdh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2624 AcroRd32.exe 2624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2772 1684 cmd.exe 29 PID 1684 wrote to memory of 2772 1684 cmd.exe 29 PID 1684 wrote to memory of 2772 1684 cmd.exe 29 PID 2772 wrote to memory of 2624 2772 rundll32.exe 30 PID 2772 wrote to memory of 2624 2772 rundll32.exe 30 PID 2772 wrote to memory of 2624 2772 rundll32.exe 30 PID 2772 wrote to memory of 2624 2772 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\loader-o.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\loader-o.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\loader-o.pyc"3⤵
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5901af37a28bb1ac5d9e3e6f91770e27b
SHA11a98ac18375d6775e619b1c7e57f4d7274db5492
SHA2564fa9a88fa7e079443e9e5c4290f0e1ab568c9cf0b154f552b535c5808a3577a6
SHA5124de64283063566a55c17776ad79ce1d1ec143e5a32d0cde5638ecae4250ddcdc5726c01278abc12cfe42eb21d7bc09491b8a4f301a837a9e38409617818cb481