Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
UnbelievaBoat-AUTO-main/main.py
Resource
win7-20240705-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
UnbelievaBoat-AUTO-main/main.py
Resource
win10v2004-20240704-en
windows10-2004-x64
13 signatures
150 seconds
General
-
Target
UnbelievaBoat-AUTO-main/main.py
-
Size
3KB
-
MD5
797f25c8754061aca934ee7653949f3d
-
SHA1
0d34199e1ab3cdf027d1199cd108fcd394ffef77
-
SHA256
7f0b60b273e7fa44dc079f24d06a95e915df20f37dfac955d19194c0059da93a
-
SHA512
3a188395b635f7e8a0600b34f61b5904ea2e7de48462c39225520f430c1a50cc453b55edcffe921716997acb505d2e01d26bb79df2290d10f83b56c22938fd99
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2116 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2116 2156 cmd.exe 31 PID 2156 wrote to memory of 2116 2156 cmd.exe 31 PID 2156 wrote to memory of 2116 2156 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\UnbelievaBoat-AUTO-main\main.py1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\UnbelievaBoat-AUTO-main\main.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2116
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2412