Analysis
-
max time kernel
103s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 00:45
Behavioral task
behavioral1
Sample
Skrypt na kopanie afk 1-8 ch rapy.pl.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Skrypt na kopanie afk 1-8 ch rapy.pl.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
mc-token.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
mc-token.pyc
Resource
win10v2004-20240709-en
General
-
Target
mc-token.pyc
-
Size
925B
-
MD5
5421b6392daad0ab575dbbec871577b4
-
SHA1
6698c220d19698c82f76ae3fa216920090ad4da0
-
SHA256
c608a5174ee93c59131fd250e7ea60dcd5b10adb376ebc683e06aef80461e42d
-
SHA512
32bcb7c1fc382aec0cb21454485c35f48ce5a2dba6a00126eaad5ac6ad204074ee3e50150e69396347cf5fd1b0cbd874ea809826c19e9c2a54722c312fc733ff
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2864 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2864 AcroRd32.exe 2864 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3028 2240 cmd.exe 30 PID 2240 wrote to memory of 3028 2240 cmd.exe 30 PID 2240 wrote to memory of 3028 2240 cmd.exe 30 PID 3028 wrote to memory of 2864 3028 rundll32.exe 31 PID 3028 wrote to memory of 2864 3028 rundll32.exe 31 PID 3028 wrote to memory of 2864 3028 rundll32.exe 31 PID 3028 wrote to memory of 2864 3028 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\mc-token.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\mc-token.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\mc-token.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD523f2ced7e9328959d5fe6ea739f9d265
SHA1fa37616837ab64e520bcb038f460b158b6c6d909
SHA25674d9dbe05e01cf434e4c5770b859e0ea8b17ff1b20d1d34396034a9250419a13
SHA512fc369d3552d09d96bcfcf79c27856d1dc98b48ca772f9034316bb5c655c85ccfead010c0829ad64d5d39a04e7e86eff0ec8ab1fbfb097bd06f10413f8ff1dc74