Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 23:58
Behavioral task
behavioral1
Sample
Exela.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Exela.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240802-en
General
-
Target
Stub.pyc
-
Size
178KB
-
MD5
0b4619408057552e0dcee774b6cb8f65
-
SHA1
c364b60ddf2fd33a4368fa8f32ec50e8ff27b00d
-
SHA256
30e940d49ce4de6dac8c07b3c7a7253c6a3b41f7fdb7b177f5da6a00fca4b31a
-
SHA512
8772bbcf320e03e7f7157af4168d95c15ee0b719e4819307bc98b6cec7ca2c4ce624a400bf4f050bd64629ef5f821ee1437cc447b08aae9a6d739f817f0baec2
-
SSDEEP
3072:hPGcc+7r5FEj5S1njCuGTvO0K2ehnxVZ7uuG6ZX/jaVyNq8aZ9/eM6JxB3wluH+b:hPGa79eArZ2eRHjaVRpeDNl+b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2848 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 AcroRd32.exe 2848 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2624 1976 cmd.exe 32 PID 1976 wrote to memory of 2624 1976 cmd.exe 32 PID 1976 wrote to memory of 2624 1976 cmd.exe 32 PID 2624 wrote to memory of 2848 2624 rundll32.exe 33 PID 2624 wrote to memory of 2848 2624 rundll32.exe 33 PID 2624 wrote to memory of 2848 2624 rundll32.exe 33 PID 2624 wrote to memory of 2848 2624 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a1a7bcaadee0ccedeb758e8c338b3fa5
SHA1c5f057cadc57d7138c2f2b3eb87489b7cb7eda22
SHA256f1394034ef385fdcd9f3e19ab61de5b2c402c027abab6c36ba0a82435243afc3
SHA512e25bd220f8ec768d065f12c1427d2a096edadd1b203291a58b7a4ca39bd937176b3bc166a0f35ff5ad404f9a0f50da2848be36267b81a868865b199314fd82e9