Analysis

  • max time kernel
    103s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2024 21:27

General

  • Target

    .pythonlibs/lib/python3.10/site-packages/aiohttp/__pycache__/formdata.cpython-310.pyc

  • Size

    4KB

  • MD5

    7539bb80505c5cbd95eed43b6e0fcbae

  • SHA1

    4ba07baa7329edd913db9ee156bd7c62a9c1f691

  • SHA256

    0e43631b2092c4e96039b468c2189d31eccfac7042026f37c5f8c49146c87895

  • SHA512

    5facaef9b1a3fd1354c547a26123ce2e80ea60720415b3d8b1e61e53f19efb119587e51cf75b407f0a9e473b470f9ed199415974a47d7983ebf2496f386a32ea

  • SSDEEP

    96:5HzqwPn7/Xmv9IY9M1CVHTyOnA1IAlyC18xvUcfZyNQFfWnzKhDOhr:5H9m9zSYVzjAmGylxfAWFLDOhr

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\.pythonlibs\lib\python3.10\site-packages\aiohttp\__pycache__\formdata.cpython-310.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\.pythonlibs\lib\python3.10\site-packages\aiohttp\__pycache__\formdata.cpython-310.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\.pythonlibs\lib\python3.10\site-packages\aiohttp\__pycache__\formdata.cpython-310.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    fadf822db4c55eecd1759fcfa5c85c9c

    SHA1

    6d06980dcca68d2a896ebc54aeaf3258f531f37b

    SHA256

    0d32c58945b83f2c79e1a99d8c909fb354d5bdc7f8869cd8da49a47d68653a5c

    SHA512

    7dead0a348a5f3eea3aa85946da4f55380e70e3c09be931d622be0cc617fa450c431903073296a02e70dd3307d7ad80069edc9e1761e80da37a60206e66149e8