Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 00:41
Behavioral task
behavioral1
Sample
Skrypt na kopanie afk 1-8 ch rapy.pl.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Skrypt na kopanie afk 1-8 ch rapy.pl.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
mc-token.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
mc-token.pyc
Resource
win10v2004-20240709-en
General
-
Target
mc-token.pyc
-
Size
925B
-
MD5
5421b6392daad0ab575dbbec871577b4
-
SHA1
6698c220d19698c82f76ae3fa216920090ad4da0
-
SHA256
c608a5174ee93c59131fd250e7ea60dcd5b10adb376ebc683e06aef80461e42d
-
SHA512
32bcb7c1fc382aec0cb21454485c35f48ce5a2dba6a00126eaad5ac6ad204074ee3e50150e69396347cf5fd1b0cbd874ea809826c19e9c2a54722c312fc733ff
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2880 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 AcroRd32.exe 2880 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2952 1528 cmd.exe 31 PID 1528 wrote to memory of 2952 1528 cmd.exe 31 PID 1528 wrote to memory of 2952 1528 cmd.exe 31 PID 2952 wrote to memory of 2880 2952 rundll32.exe 33 PID 2952 wrote to memory of 2880 2952 rundll32.exe 33 PID 2952 wrote to memory of 2880 2952 rundll32.exe 33 PID 2952 wrote to memory of 2880 2952 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\mc-token.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\mc-token.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\mc-token.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55c63d2186d3bd4e5232817256536c08e
SHA1a5ad847582156d283c43fab6a694cc734a1dd462
SHA256af21f5c3ff5eb5147d36d4f56286925bd448a8dc3d121187cefada26a2ad7632
SHA512ceb027f9d218b5dd4cfcce41c3055582398cbc8561241224d815eea014cd4d7d90d6be7c08d4f31ffabd3f3fe4cd85c8f37d2ef52388fd1474ad1b2a337a14b9