Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 20:16
Behavioral task
behavioral1
Sample
randomvirusas.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
randomvirusas.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240709-en
General
-
Target
Stub.pyc
-
Size
875KB
-
MD5
00274f064abd4a02b0347addec8bdd91
-
SHA1
7f69efbc1cf90711db5e81eedb016d06f26287b8
-
SHA256
00fe95dd76396b242d5c86ea37ad2c5d1ddc1a266c1eb806cbd8c91b99d331eb
-
SHA512
2e5f8cb3aebb09c4a2cc8165d3cde803c64a619cbd728fea87ed08af1353ea0d33145d2f68cf83f2b1a02e5c19d6698de87d63823c6b963a7ec3717d3f2543c2
-
SSDEEP
12288:biGRiHu6cHl0hcH/M9tB5DDszoVNpCrA4Mo6EfFULws2FQ9pAVBDBN+oFFgC0iSN:biWiH4/M9z6Gto6EfFyiQDA1N+oUCmN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file\ rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2748 AcroRd32.exe 2748 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2112 2372 cmd.exe 31 PID 2372 wrote to memory of 2112 2372 cmd.exe 31 PID 2372 wrote to memory of 2112 2372 cmd.exe 31 PID 2112 wrote to memory of 2748 2112 rundll32.exe 32 PID 2112 wrote to memory of 2748 2112 rundll32.exe 32 PID 2112 wrote to memory of 2748 2112 rundll32.exe 32 PID 2112 wrote to memory of 2748 2112 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f68d3f8e349b74f5ade1171a40d07009
SHA13ef1b649c5433368c5af32fc67baa3caa3f3d30c
SHA256af558d91bc0acccb3ee6b8e65e42b10447e7d6aa9621bb5ad22ebc54c3791f3c
SHA5126de6953599b3bf22b83ca07410541e0dea1411fa13ff5f2820acc23a16662597e81eb08f43cc7ad4e4ce065a70d68d36092a4711c68d72468da4191f6251128d