Analysis

  • max time kernel
    102s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 10:43

General

  • Target

    sim_068.jpg.py

  • Size

    33KB

  • MD5

    dcfea657edabe54fc43261d5dd486d55

  • SHA1

    354bf3e5b82a705d311759338d5e3db28f5e6ad4

  • SHA256

    ea25dd47b43ddaa3df11e6d16544702a8fabbcd0031ba11d1df51461704a8973

  • SHA512

    550667fc9a1f02c92d0eeec7af33b2f2483ea476b89e16973f54622eddbba9688b95e0efa2e7c7e9133c27fb75881987014c2a1e17ed345a704e7f25c46de7e6

  • SSDEEP

    384:4g1+MzaOiOi3Rc83IeCwVT1MlkDz/k74Fft1froMzZ8tJEbH8X:t1TaOiOi3Rc83IeCwRX7oIaHccX

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\sim_068.jpg.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sim_068.jpg.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sim_068.jpg.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    4c3ef03eb6ba9662867228fcea2fafd2

    SHA1

    3fa4a3a885658f338ca35acaa81f47b7e9c30399

    SHA256

    cc821882876c795bb5c61735e246f66355223ecd9cd39368afe13ca7870eedba

    SHA512

    1c3b385998472fbe3c0535c22bf3024efb65f7dc9e14477c3adca29af61a03affff06bed140f31844a35cefcbfac396a12c1063e266fe423191616bf4b649a47