Analysis
-
max time kernel
102s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 10:43
Behavioral task
behavioral1
Sample
sim_068.jpg.py
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
sim_068.jpg.py
Resource
win10v2004-20240802-en
General
-
Target
sim_068.jpg.py
-
Size
33KB
-
MD5
dcfea657edabe54fc43261d5dd486d55
-
SHA1
354bf3e5b82a705d311759338d5e3db28f5e6ad4
-
SHA256
ea25dd47b43ddaa3df11e6d16544702a8fabbcd0031ba11d1df51461704a8973
-
SHA512
550667fc9a1f02c92d0eeec7af33b2f2483ea476b89e16973f54622eddbba9688b95e0efa2e7c7e9133c27fb75881987014c2a1e17ed345a704e7f25c46de7e6
-
SSDEEP
384:4g1+MzaOiOi3Rc83IeCwVT1MlkDz/k74Fft1froMzZ8tJEbH8X:t1TaOiOi3Rc83IeCwRX7oIaHccX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2884 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2884 AcroRd32.exe 2884 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2000 wrote to memory of 2936 2000 cmd.exe rundll32.exe PID 2000 wrote to memory of 2936 2000 cmd.exe rundll32.exe PID 2000 wrote to memory of 2936 2000 cmd.exe rundll32.exe PID 2936 wrote to memory of 2884 2936 rundll32.exe AcroRd32.exe PID 2936 wrote to memory of 2884 2936 rundll32.exe AcroRd32.exe PID 2936 wrote to memory of 2884 2936 rundll32.exe AcroRd32.exe PID 2936 wrote to memory of 2884 2936 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sim_068.jpg.py1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sim_068.jpg.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sim_068.jpg.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54c3ef03eb6ba9662867228fcea2fafd2
SHA13fa4a3a885658f338ca35acaa81f47b7e9c30399
SHA256cc821882876c795bb5c61735e246f66355223ecd9cd39368afe13ca7870eedba
SHA5121c3b385998472fbe3c0535c22bf3024efb65f7dc9e14477c3adca29af61a03affff06bed140f31844a35cefcbfac396a12c1063e266fe423191616bf4b649a47