Analysis
-
max time kernel
11s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
LSlogon.py
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
LSlogon.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
python-3.12.4-amd64 (1).exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
python-3.12.4-amd64 (1).exe
Resource
win10v2004-20240709-en
General
-
Target
LSlogon.py
-
Size
1KB
-
MD5
68f0a454821aebd66b4eb3babcdf91d1
-
SHA1
8f51343e4d49d04284d6493ea30f9b71c9b84f40
-
SHA256
4c81464cf5f43c89579631c0585b0e8add282922cc1dcb7e58a8eb0062406f3f
-
SHA512
90412161575a0a8ef7534639812539236ae3979bdf02f0d8ca728b0f54c9582f87a2088581c78d9deb914f7518249ad98397dca5db09ec395e9f4824cf061d58
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\ rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2932 AcroRd32.exe 2932 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2296 wrote to memory of 2132 2296 cmd.exe rundll32.exe PID 2296 wrote to memory of 2132 2296 cmd.exe rundll32.exe PID 2296 wrote to memory of 2132 2296 cmd.exe rundll32.exe PID 2132 wrote to memory of 2932 2132 rundll32.exe AcroRd32.exe PID 2132 wrote to memory of 2932 2132 rundll32.exe AcroRd32.exe PID 2132 wrote to memory of 2932 2132 rundll32.exe AcroRd32.exe PID 2132 wrote to memory of 2932 2132 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\LSlogon.py1⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\LSlogon.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\LSlogon.py"3⤵
- Suspicious use of SetWindowsHookEx
PID:2932