Resubmissions

11/07/2024, 23:46

240711-3sg23azclr 10

11/07/2024, 23:38

240711-3m8b3azapm 10

11/07/2024, 23:35

240711-3lch1a1hpb 10

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 23:35

General

  • Target

    source_prepared.pyc

  • Size

    65KB

  • MD5

    65a0ac3b3123e17038508fc9b2b809eb

  • SHA1

    75a35cfa1cf55038655253987ac55cbafe90ea67

  • SHA256

    c50df877c6cec044c33e5c6591eb710bcd4d9014c2867bb22f885962977a37a4

  • SHA512

    b35125cbae9d35e7bb15c5a49b4ec62bf8ed54c62defdcb4080f18e40df173385b2b78d1e2ca503f076a9e734f4528fecac97009068d7318768d4de4c187dba8

  • SSDEEP

    1536:iaORgVgP9tXayBj1uYCFjU7x/IdBdoTupxU:YRg2/XVBkFw7xodop

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    b464bd8057f18620f2d70ddfa3e35daa

    SHA1

    42cf0cffac5866e0d0c3f5a127b040aab7004008

    SHA256

    3b5f8bb096a4d3b4dd77b6236deb345fd2f3198735dbefcb5335e603316b621b

    SHA512

    08d274a782fdea3e859bd1b5577e18064b61d41041be86bfc2350249cc10443fe5b7559de03bcf3d4c9c9b3ee6f89ce64012ffd436cae59dcbda9163078256d3