Analysis
-
max time kernel
102s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
tools crack.py
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
tools crack.py
Resource
win10v2004-20240802-en
General
-
Target
tools crack.py
-
Size
3KB
-
MD5
12c24e10aab48a58e6a726ea7445b508
-
SHA1
2b05d9b48afef45a3c1958e85070550d4b1ac915
-
SHA256
e9007188d24bcc54f1cc4ce466bb3e4bf051816c00cdc5851c713803e0e0b3ed
-
SHA512
aa556946147725177029582a7260a4516408e1109b9093fa53990820e95500a4cd55d27b81122a99106b337e7bf639c586b1c4fc393d784020a0ff138b18db66
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3008 AcroRd32.exe 3008 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2712 1644 cmd.exe 30 PID 1644 wrote to memory of 2712 1644 cmd.exe 30 PID 1644 wrote to memory of 2712 1644 cmd.exe 30 PID 2712 wrote to memory of 3008 2712 rundll32.exe 31 PID 2712 wrote to memory of 3008 2712 rundll32.exe 31 PID 2712 wrote to memory of 3008 2712 rundll32.exe 31 PID 2712 wrote to memory of 3008 2712 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tools crack.py"1⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\tools crack.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\tools crack.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD598a206f76ad9177598121a4087a341b4
SHA1ec6fbfcf8a1f5801e6573512d5cb8d17ee5693e1
SHA256126dff830c7a3e0103fe1beb761446feb09a4d5d32d98d6835e596cb4dd1dcd2
SHA512ba65de682264bb004b2b61d8c4f397be2f99a97f1c3f7d0aeec3d875ae8d8cff3088f3d42f020c5d2344e456e10427eed9dee13f683413df2f8937a3db2391e1