Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 16:50

General

  • Target

    Twitter-Account-Generator-main/helpers/oauth.py

  • Size

    3KB

  • MD5

    3bfddbdbb4de8724db1b875fc81d1ebb

  • SHA1

    6c5d0cd20979072290a161a3b853211acd7f3fa4

  • SHA256

    be0fcaa5f1f2c1fd54a7a2dd5909ae94d139ff87cf4b4ddd2c7acdce5769de3d

  • SHA512

    bb39560d9f08dea226425b5f9736181bf4b67704f588ff41a033c4468eea0d2a19fc92cb4d54b1eae7a980b539610bb5825e9e6f966d9754c0abfd146b5ea060

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Twitter-Account-Generator-main\helpers\oauth.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Twitter-Account-Generator-main\helpers\oauth.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Twitter-Account-Generator-main\helpers\oauth.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7b4ef6b3df250afac0376ec69408a415

    SHA1

    d251088dc50b1cd56ece4a20fa2e3704ed6c51d6

    SHA256

    7015b357d185a0462e19c7a7f242eaae178639d975670154e9f452e05cb024e7

    SHA512

    a9bde2dbbd832fe602755fe4ed79bfd8db9800767226a25d2436195be1809173a3c59f0dcd110cd554ad0866f4d5fca97feda16668df869692e9862f01edec41