Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
92dc0f9709224f4903372338911fdee181d66a1ffa2f77e5b14f93b168a24992.py
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
92dc0f9709224f4903372338911fdee181d66a1ffa2f77e5b14f93b168a24992.py
Resource
win10v2004-20240802-en
General
-
Target
92dc0f9709224f4903372338911fdee181d66a1ffa2f77e5b14f93b168a24992.py
-
Size
6KB
-
MD5
e662a466c150882a356f274ea91c45e1
-
SHA1
26076683432cd85ca7c7f0dc2d741ece7e26aa05
-
SHA256
92dc0f9709224f4903372338911fdee181d66a1ffa2f77e5b14f93b168a24992
-
SHA512
8ef3282489955e83f2a8c44f08bc24c854f04b68aec2e904063db7d5e2f54ee0ef444e1ea3647246d64ba19b367c825059a15e68ffc6e5a4b606dbd4056eb556
-
SSDEEP
96:NawtV9bqu70dLOZUmRcZDlvKF47Q0DGmVfrKBw+i1Yb0v3WpoQoB2:zXqu7eOZUmRcZRve06JBwj22GelB2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2836 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2836 AcroRd32.exe 2836 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2980 1596 cmd.exe 31 PID 1596 wrote to memory of 2980 1596 cmd.exe 31 PID 1596 wrote to memory of 2980 1596 cmd.exe 31 PID 2980 wrote to memory of 2836 2980 rundll32.exe 32 PID 2980 wrote to memory of 2836 2980 rundll32.exe 32 PID 2980 wrote to memory of 2836 2980 rundll32.exe 32 PID 2980 wrote to memory of 2836 2980 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\92dc0f9709224f4903372338911fdee181d66a1ffa2f77e5b14f93b168a24992.py1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\92dc0f9709224f4903372338911fdee181d66a1ffa2f77e5b14f93b168a24992.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\92dc0f9709224f4903372338911fdee181d66a1ffa2f77e5b14f93b168a24992.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD546b828cb768ca79c2b4055566165fc6b
SHA18ca79838fc349fae4766eb536be282d312221afe
SHA2562e76f57b030536d9a850f7e3f33888ab9f32f31216d3acd669163a4747a578ad
SHA5123ae6fcddcf6532795c37cf8e4be495740f10d66b3b2a68276701a205d33b3e638ec9c235e7758e8f5429ea60edc9db6ab1fe7b81d8a9e515e0bfbc7e01a76def