Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    04-08-2024 22:18

General

  • Target

    xbox.pyc

  • Size

    5KB

  • MD5

    61f065bfd934d32cad71648a566354a5

  • SHA1

    5053222a221bbcfebdfa3d033e9999d245a01fba

  • SHA256

    db8755b8c9425094dc84e6090d5ccfc40a68bb3d848f7c6a621f7afdbf625e83

  • SHA512

    a6201ba400d97dc527c10865b211c3a982f9fe503a3b700ac29c1d11ca7935ae3632a176ecfa80861ceb096fcb66a743866eee107370af424812a19a8c3f3f3f

  • SSDEEP

    96:OGlzU+46rFVv0gff9SNI7D7SvFm5/4MO2T:OrOPXgN0iJMLT

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\xbox.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\xbox.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\xbox.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    be2d7ba60817875a5c54e79c75055c0b

    SHA1

    828faca054d794a75f417b667f0eaac692c86e7c

    SHA256

    bb975ba19a3a3c869940ba38cfe74e8ffcef3a49a364dc82d66e011a622cb539

    SHA512

    84b48f2ca8c25d0334c9a725ba00877e8d1e90346183fb79946c13b5caaaf3120bb35453696814f47fdbee096b5147876aa2bdac995ee05bd1fb960d6aab78f6