Analysis
-
max time kernel
31s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
ValidateKeys.py
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ValidateKeys.py
Resource
win10v2004-20240704-en
General
-
Target
ValidateKeys.py
-
Size
5KB
-
MD5
50beaf0ce06a7761027e935b5c18416a
-
SHA1
fca78d7112e25382990e61cfcd814d68e42f9a15
-
SHA256
c8e4a01097f6165d5fbd21634c867eba014dab1e81c89f5d29bf62c4cce7801e
-
SHA512
15f8de6395dbb300a33d6c5332cf01ae7ee99b1ba01e55bb21be46b89f79be65ecfda3e4a1ce77599a558caf27b2bfe13515df790f10c70454ddf6f1b9fbf398
-
SSDEEP
96:OeXl/iryahbTPVWhTTzPH9i98Z3HWqHJfRNGtnb3vJ/0M8W9fykShFm:B8yahbTPOTTLp324wrvJcrW9KkWm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\py_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\py_auto_file\shell\edit\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\py_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\py_auto_file\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\py_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\py_auto_file\shell\open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\py_auto_file rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2832 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2368 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe Token: SeShutdownPrivilege 2728 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe 2728 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2368 2384 cmd.exe 31 PID 2384 wrote to memory of 2368 2384 cmd.exe 31 PID 2384 wrote to memory of 2368 2384 cmd.exe 31 PID 2368 wrote to memory of 2832 2368 rundll32.exe 33 PID 2368 wrote to memory of 2832 2368 rundll32.exe 33 PID 2368 wrote to memory of 2832 2368 rundll32.exe 33 PID 2728 wrote to memory of 2764 2728 chrome.exe 36 PID 2728 wrote to memory of 2764 2728 chrome.exe 36 PID 2728 wrote to memory of 2764 2728 chrome.exe 36 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 316 2728 chrome.exe 38 PID 2728 wrote to memory of 480 2728 chrome.exe 39 PID 2728 wrote to memory of 480 2728 chrome.exe 39 PID 2728 wrote to memory of 480 2728 chrome.exe 39 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40 PID 2728 wrote to memory of 692 2728 chrome.exe 40
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ValidateKeys.py1⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ValidateKeys.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ValidateKeys.py3⤵
- Opens file in notepad (likely ransom note)
PID:2832
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5fe9758,0x7fef5fe9768,0x7fef5fe97782⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1212,i,1731546252909329198,4188776066898701289,131072 /prefetch:22⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1212,i,1731546252909329198,4188776066898701289,131072 /prefetch:82⤵PID:480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1212,i,1731546252909329198,4188776066898701289,131072 /prefetch:82⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1212,i,1731546252909329198,4188776066898701289,131072 /prefetch:12⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1212,i,1731546252909329198,4188776066898701289,131072 /prefetch:12⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1228 --field-trial-handle=1212,i,1731546252909329198,4188776066898701289,131072 /prefetch:22⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1360 --field-trial-handle=1212,i,1731546252909329198,4188776066898701289,131072 /prefetch:12⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3716 --field-trial-handle=1212,i,1731546252909329198,4188776066898701289,131072 /prefetch:82⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD57703f769fb893b50c0ccd5eec8dc97f3
SHA196f6259ebc86628dc0481831bddd25cef15bc754
SHA256e4c1f351bc9683b5e4db23ead748d7b6ddd4f248cabe75b4f2fc25098c77ea92
SHA51202c10bd3e24294b0ea1501308e2939d23a94f7c317af866bb2b5b80dc64b3ce06eccf08e3626c5d24738d90b6c9c7269ff44b549d8a8efa765c18a48e52d4008
-
Filesize
5KB
MD5e9db0640450335e97292fa1b39685a6b
SHA1677e036a668af8cf1a7708930ff149c3a28a75fa
SHA256fb54d3d6daea2344ad58543bb2fb47ef070d0b366c1f35fc5a959dfe9a1e241e
SHA5121611af508ab4fbb19f5f3117391ec61daa757c91dda7de2eb5f3daf0492c33fa5aa8d252ee2ca50802c4f6354ccdc33d325b95fcaf0822ea6678582cb00bc4c6
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2