Resubmissions

05-07-2024 23:04

240705-22ners1brd 6

05-07-2024 23:03

240705-21x8ksybrr 4

05-07-2024 23:00

240705-2y63ps1blb 6

05-07-2024 22:56

240705-2w6zxs1aqa 4

Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-07-2024 23:00

General

  • Target

    python-3.12.4-amd64.exe

  • Size

    25.5MB

  • MD5

    f3df1be26cc7cbd8252ab5632b62d740

  • SHA1

    3b1f54802b4cb8c02d1eb78fc79f95f91e8e49e4

  • SHA256

    da5809df5cb05200b3a528a186f39b7d6186376ce051b0a393f1ddf67c995258

  • SHA512

    2f9a11ffae6d9f1ed76bf816f28812fcba71f87080b0c92e52bfccb46243118c5803a7e25dd78003ca7d66501bfcdce8ff7c691c63c0038b0d409ca3842dcc89

  • SSDEEP

    786432:zRd0l0X/46+nq1rcVqA5Z2bQcLsv0GlYrJF55e2nRk:L5P46+q1QTILMKB5e2nRk

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 27 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\python-3.12.4-amd64.exe
    "C:\Users\Admin\AppData\Local\Temp\python-3.12.4-amd64.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:716
    • C:\Windows\Temp\{749A7041-BE0D-42F4-99BE-F28720C59FF1}\.cr\python-3.12.4-amd64.exe
      "C:\Windows\Temp\{749A7041-BE0D-42F4-99BE-F28720C59FF1}\.cr\python-3.12.4-amd64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\python-3.12.4-amd64.exe" -burn.filehandle.attached=548 -burn.filehandle.self=544
      2⤵
      • Adds Run key to start application
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\.be\python-3.12.4-amd64.exe
        "C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\.be\python-3.12.4-amd64.exe" -q -burn.elevated BurnPipe.{86A362B9-0109-4FE0-BF41-719C9A47D6D4} {318B44D6-8AC5-40B2-9EE6-D3C36D347DAA} 2196
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1908
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:3972
  • C:\Windows\system32\srtasks.exe
    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
    1⤵
      PID:4616
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e59aded.rbs
      Filesize

      7KB

      MD5

      68050134865c142185b4e2fc3d597f1e

      SHA1

      9e58a5b4c16d936ec68637f1dd6e738c7d5c0a1b

      SHA256

      363336b33d948c008035c4da49d657982dea18a4c3f763c9cd4519c546d9da9b

      SHA512

      ec2dd15793a92c094ed28d7e8dd6229a2ebeabfa2ac0a6ac86390e604ba6519cd36715ff40164cde4f3d27f741494110339ef471ffcae14c62ed7708ef2a292a

    • C:\Config.Msi\e59adf2.rbs
      Filesize

      11KB

      MD5

      040c6a978eb5be82f9285072326507c3

      SHA1

      33bfc338c50485cedccad7a996ffbac32c11cc60

      SHA256

      8a3129921a629dce41da584113cfe29557a50a39aa0adbbd6fb61a24c4ce7655

      SHA512

      076b62fbcd11d4c515926226aa423757845b9c208faaf063db40bb6f3d545e168ff6169642d06fdd7ace6104e54da78717af4b010ed3fe8c55edd2342eaf3d57

    • C:\Config.Msi\e59adf7.rbs
      Filesize

      43KB

      MD5

      9386469f653f85f3bb00c8d9ecb3d846

      SHA1

      747434a4277cfb874e6070f715f7aacd94149bdd

      SHA256

      c4104583032faf63a56b2a77e7fd5be6941d1814a4770d4b4f21745141ce3fb1

      SHA512

      30e79c9a43745192003902b74d2068229d361e4a7a99051ce6de90e7ebd891560c2cca083a96db1f86246f71f966a46b4061e485aa1bacdcf4dee8e022425cea

    • C:\Config.Msi\e59adfc.rbs
      Filesize

      116KB

      MD5

      9c27f930547f98ea7d745c43df9a0d20

      SHA1

      4d41a32908c66074d57f5bd0b67ba543510ecb24

      SHA256

      3ba1c0e58221b5ee88a7f9eb6ec7e42c6740891ca60f2724a91160852dba81a4

      SHA512

      14dd75f196fe7118c96ba2f884996611b477bba90856bf05bf016c26ca3056bdc86a3ac2a5704dbb16232ed825caaf811d232cfd8812189359af92c392eca06f

    • C:\Users\Admin\AppData\Local\Temp\Python 3.12.4 (64-bit)_20240705230037_000_core_AllUsers.log
      Filesize

      3KB

      MD5

      5295e704322a41314dab8aeebd2d3050

      SHA1

      c3ac716d8d2d88973d906ef01fc824670af04b81

      SHA256

      87b27922ca5c011f346caff87f540d44b67d700380ed34061161b534310574b9

      SHA512

      182bda0425afb80157329f76cac6b3de1ffaf919cea6f8afd1b6de6687292699096e3213ac265192ab28122a9a18d17775b29369503957c437fbe1c9920df97f

    • C:\Users\Admin\AppData\Local\Temp\Python 3.12.4 (64-bit)_20240705230037_001_exe_AllUsers.log
      Filesize

      1KB

      MD5

      7b6c3791ad7dac1460ea4ce68d07a6f2

      SHA1

      d4285bb5c894907a1d8fab23d449951a51613f67

      SHA256

      b625174bd595a969416fbec75b527df500ecda3e818263ccf0e05f11e02f1a68

      SHA512

      1d751b7c3f2714b309b49766d86d09b81d60ab936541cc05e45b3b0899b40559716d09615287c22d832b2319fb8ec61edca1a5e7095f45ad7b8eeb925f51d4d1

    • C:\Users\Admin\AppData\Local\Temp\Python 3.12.4 (64-bit)_20240705230037_002_dev_AllUsers.log
      Filesize

      1KB

      MD5

      885940b080087fdeb123e57dde1080c0

      SHA1

      58c4956299aef6301a7981e0b050eb99cf5c6985

      SHA256

      8009dd5bf13898605f724ef55e9db224d5bcf7154fe6c124e80936092dbfd1e7

      SHA512

      a990ce293176fdd86e052fb49f2e7eb56e2d7c11ec21ba2cd8125b897bc9f4758ce4fed89ed3b2a6f3684fc15d1b0b0df9dae53ab674bed1604f47e321c92103

    • C:\Users\Admin\AppData\Local\Temp\Python 3.12.4 (64-bit)_20240705230037_003_lib_AllUsers.log
      Filesize

      1KB

      MD5

      696013892d93d818213d06af8e16b104

      SHA1

      fd434eddc2833a9ce86f828934bb77fe535d5442

      SHA256

      a8b95568655e7a576b0c2a4068a8358fc63be983aa2c6050efe3a977e9270d02

      SHA512

      a20c6a2395124caa8326202c8aa167ae61ae1d6dece64dffff2252916cdc758ffddb10089336cafe65393de9aab868f2e89dec4a4e70c3ee74c1fbcc93e5816e

    • C:\Users\Admin\AppData\Local\Temp\Python 3.12.4 (64-bit)_20240705230037_004_test_AllUsers.log
      Filesize

      1KB

      MD5

      dda3f96145db463dbd1477d90933e779

      SHA1

      87e2e7eef675f0828672d1e641c57bc43d749119

      SHA256

      ea733ce837265426734784ba68b45d81916853c3f9a24b6abbcc568e94ec830c

      SHA512

      f41f7080214e80a4f8432f28bffa9abb1bde2cc5d66a5e0c211f34be45df052a434ac1f6df1e2c0a46d51e0c14f04014ddb82dabee32949b7b42b47beaa9173d

    • C:\Windows\Temp\{749A7041-BE0D-42F4-99BE-F28720C59FF1}\.cr\python-3.12.4-amd64.exe
      Filesize

      858KB

      MD5

      504fdaeaa19b2055ffc58d23f830e104

      SHA1

      7071c8189d1ecd09173111f9787888723040433f

      SHA256

      8f211f3b8af3a2e6fd4aff1ac27a1ad9cd9737524e016b2e3bfc689dfdad95fb

      SHA512

      01aa983cbddfe38e69f381e8f8e66988273ef453b095012f9c0eeae01d39e32deb0e6fb369363cbb5e387485be33a53ac3ec16d3de1f42bb2cde0cfa05ceb366

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\.ba\PythonBA.dll
      Filesize

      675KB

      MD5

      e58bf4439057b22e6db8735be19d61ad

      SHA1

      415e148ecf78754a72de761d88825366aaf7afa1

      SHA256

      e3d3f38fd9a32720db3a65180857497d9064cffe0a54911c96b6138a17199058

      SHA512

      8d3523a12ee82123a17e73e507d42ae3248bd5c0aa697d5a379e61b965781bd83c0c97de41104b494b1f3b42127ab4b48ac9a071d5194a75c2af107016fc8c9c

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\.ba\SideBar.png
      Filesize

      50KB

      MD5

      888eb713a0095756252058c9727e088a

      SHA1

      c14f69f2bef6bc3e2162b4dd78e9df702d94cdb4

      SHA256

      79434bd1368f47f08acf6db66638531d386bf15166d78d9bfea4da164c079067

      SHA512

      7c59f4ada242b19c2299b6789a65a1f34565fed78730c22c904db16a9872fe6a07035c6d46a64ee94501fbcd96de586a8a5303ca22f33da357d455c014820ca0

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\compileall_AllUsers
      Filesize

      788KB

      MD5

      af000d36b9daafcc9035c2d8819b9cd2

      SHA1

      610f50c25df959598a0945fcae25bd78dd5b0f4f

      SHA256

      8537294a0eb1f662317e3fa7411fbd82f5851cb70288e7fae04b59d7b03b65aa

      SHA512

      71b7be27ebbd0c92a8a0ccdd9e94566b1a21140d9139e7a168319c5f2eb5536eec647c08b9107279f56586a5b53e638d857e4aa6cf3c09cfbb4ec22f385146e4

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\core_AllUsers
      Filesize

      1.9MB

      MD5

      922be790a111acce21e21dddb2b346a0

      SHA1

      44abc66e873d291d2123fcd54a98471267369ab9

      SHA256

      9e6da1e5d4cfcef4b6c463c2606473cd2a7b1cb3fb428857b39639c73e73ae4a

      SHA512

      36f9403beb2566e048aab3091052d52ac058c2152998ddb28de35b3ac0fd760c8027fbec0ad060d1f872fb79e1782ff35e4debc77e6268b4bffb6b9b8eedadea

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\dev_AllUsers
      Filesize

      384KB

      MD5

      229230103408fb024f3b0202aa03b89d

      SHA1

      ac1c74602d0266c354b8aa9d5f80212f169a4e77

      SHA256

      99d874c055615ac8c7012ccaf4b6e12a6b469ddee1d3422d20fccb2041877fd7

      SHA512

      0c11122e94c363b97362eb331d1ef166e37ff55beee90c3bfb9f41cd70c9967ce0099d6d1d5020f5439dd13a71545abb94ccab4148dbd499ecafb191367d416b

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\doc_AllUsers
      Filesize

      5.5MB

      MD5

      d81b5f1043ece3954de5a7c9d7f930f8

      SHA1

      9d57a77752e2b54bb6947d92f33c97e37e251008

      SHA256

      190e5bdd4c77c164106728ba1818e5dee4da832ef40884c39deb73fcf3c63a32

      SHA512

      33134875864013c87b7a80338560b1e845c85064a947df0dffe09c5814fe02ad2009885ce0017f7cd0a1b1725b8b6860e8fbd2b2a30b4659b58652114c5478fc

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\exe_AllUsers
      Filesize

      720KB

      MD5

      74caed2618cab1c21fdd9746d688cb2a

      SHA1

      fa64f4fb6b82431171b0e725d9fab082f75c13e4

      SHA256

      a2a3db80d4c8d1ee9c52a3620df099ffb5e56eadbba010ac71d94588773e92f4

      SHA512

      d806199e2a5d852695c321ed56a79da6e583e8a877c41a9ef29ca9a76513fa388cc2058e539bc91b701e4de6191871c97fba8689ced14d6013180a3b5dae7b6a

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\launcher_AllUsers
      Filesize

      540KB

      MD5

      9321731c44fb531cdceaefe14fd13489

      SHA1

      ddfd199d4cbef87439dab4add0ef4980fa272b77

      SHA256

      434f0b25b56b853c26bc04e365aa2eec3563a2d1e83a39b471c18a8cc2ddf5e3

      SHA512

      188712f7f6be4f2f6e381cebcec90e789a3207751bdf1e448ddbde4c77c0bf92a5c4f3556ed9d0dffe99964377aab54004e0176d8cfb7cf30afb526245a7ea61

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\lib_AllUsers
      Filesize

      7.3MB

      MD5

      43f337178c43edf715fbdf2e959e15d0

      SHA1

      b353117b01441b63fa40fb65ca07f30d501ef2b6

      SHA256

      4ff22c3f02870389ff042b3014847e8ed2dd49306bb61437967066fd524446d8

      SHA512

      994def9f953d8e33073c04ffb6d5b0e5eac38c7430616823d8cbccdd76f38aad2bd56784526d6bf6385cc385947591b207f095840535e5a477186e0732b9e755

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\pip_AllUsers
      Filesize

      268KB

      MD5

      79d86625b64b0fcfc62e65612f1d8f48

      SHA1

      8980df9ee6574cc2e9e2290d015a42023b8279ea

      SHA256

      0c79f5d2c62a344f0b7ea382d30912addff3fec3a6c8f905dbdc7de6e305d557

      SHA512

      2bcd9d3f8ac3139c946ca182b5697ab88926378e613140ec17d1e2c641fe6708acd3246376047a069282260aeae70fb22f0bee077e0799940ff9cc0fd31ba9ae

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\tcltk_AllUsers
      Filesize

      3.4MB

      MD5

      e6d634b254c818bc36e0359538cb7ace

      SHA1

      02ec6b1121223b455b4672f850ca752ec7371c5a

      SHA256

      6a6200c6a8441d667d25c52750b0b7a3e48367c3b6343ed1e0d3edd5e43f8539

      SHA512

      1350dbfbdb2038ae22213cf643904f01150f3b89f226f20fdb72055e03766386464920086ce447c250f13a3a494aeb340626553b5acabedc1c63740c88d53859

    • C:\Windows\Temp\{7C3B987B-B2D7-4617-B7D8-2EF58856A399}\test_AllUsers
      Filesize

      5.3MB

      MD5

      12e9ecedd11898d5ab631466857dcbe2

      SHA1

      502c9f232f403f94721f1d0a0f87d2f9baaf5f29

      SHA256

      cb87751ac6ddd7cd61e84ccfb0f5b88fa5dd58e79fefe5b2d64ed0967d6a76a8

      SHA512

      6bf6e681fb55f7578cd1b28284fc06c9c5edc6c0093dc0214949bcdf3624e2598a93bafd200faf020cc3b5840acd60f46290f022036d852195571c6d040e61ca