Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 01:52
Static task
static1
Behavioral task
behavioral1
Sample
T0kenCheckerRetarded/TokenChecker.py
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
T0kenCheckerRetarded/TokenChecker.py
Resource
win10v2004-20240704-en
General
-
Target
T0kenCheckerRetarded/TokenChecker.py
-
Size
3KB
-
MD5
b5d36748d71c4b375596be5be31ec4cc
-
SHA1
130bd74d52cd0bf359191ffc75542cd5fd7604ca
-
SHA256
9769bd8b4d44a55f472fae0fe0d2594d349c3c60d04810e9a9bf5c93338829d3
-
SHA512
55f2229b2d318b4dcb08998100765ac12ccd2447e6057a79c3cc767806a68af2b156690a26d4c1a9917ba01528f497383fb8487c8dd526826dace592347d0534
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.py rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2824 AcroRd32.exe 2824 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2380 2552 cmd.exe 31 PID 2552 wrote to memory of 2380 2552 cmd.exe 31 PID 2552 wrote to memory of 2380 2552 cmd.exe 31 PID 2380 wrote to memory of 2824 2380 rundll32.exe 33 PID 2380 wrote to memory of 2824 2380 rundll32.exe 33 PID 2380 wrote to memory of 2824 2380 rundll32.exe 33 PID 2380 wrote to memory of 2824 2380 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\T0kenCheckerRetarded\TokenChecker.py1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\T0kenCheckerRetarded\TokenChecker.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\T0kenCheckerRetarded\TokenChecker.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e382f5d282df9357b4cc5c6708cd7171
SHA124f73e0d9aed0a6b63a7fdb0b7418a619b0d94c7
SHA25668b7e2016f9aab3c24fe4c880aabacf6bae158e43de56e729377bf24a4721cf8
SHA5120a61d4fb3ea35af15825c8610c61d622a142349c573d582bf47ef065312ba9740e75f83c26b7065961dcf21994d21e809eb0a96b8e3a83f0653c56ff08f70005