Analysis

  • max time kernel
    102s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 16:50

General

  • Target

    Twitter-Account-Generator-main/helpers/twitter.py

  • Size

    11KB

  • MD5

    72030822617d93a2ac77fe52c3cfb3e8

  • SHA1

    faebef647627bc0841a04f04245c7bc99b6ff296

  • SHA256

    98e10715767f613e61c93bb5d759996b6c4dae220db01a71df44e6ffa5bfc8da

  • SHA512

    bd969f3d90aae21396403b4433b18e60937da5763a18fef3cf7e67702538ad85f5e77d31c7810f13734545878de502804243314ad369214e031b4f0dcd7ae7a2

  • SSDEEP

    192:8miPgeYCQZkwGGvGvpQZiVLjpO27l8/oDRwEcwfXw2:igeYCYvvGvpQZ6LjpO+vp

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Twitter-Account-Generator-main\helpers\twitter.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Twitter-Account-Generator-main\helpers\twitter.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Twitter-Account-Generator-main\helpers\twitter.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0ae5139466b73c4ef5ec8929d495d53f

    SHA1

    d578a0c78461a7e5826c1c07af202f6ad9a5bd7c

    SHA256

    97b7e4d15cba8f197ed54e578fa826e7214470ef169d21e486c0ab4661cd633c

    SHA512

    20daa64618c9086cca41b5208180c45c798f00c07f7520951c3f64a602accf25ffeb6d001c275fc3a4b08ffa808668e7ae1246332cbeced9934577ac999645bd