Overview
overview
3Static
static
1advanced-m...ls.rar
windows7-x64
3advanced-m...ls.rar
windows10-2004-x64
3advanced-m...ain.py
windows7-x64
3advanced-m...ain.py
windows10-2004-x64
3advanced-m...ler.py
windows7-x64
3advanced-m...ler.py
windows10-2004-x64
3advanced-m...ber.py
windows7-x64
3advanced-m...ber.py
windows10-2004-x64
3advanced-m...mer.py
windows7-x64
3advanced-m...mer.py
windows10-2004-x64
3advanced-m...kup.py
windows7-x64
3advanced-m...kup.py
windows10-2004-x64
3advanced-m...nfo.py
windows7-x64
3advanced-m...nfo.py
windows10-2004-x64
3advanced-m...aid.py
windows7-x64
3advanced-m...aid.py
windows10-2004-x64
3advanced-m...nfo.py
windows7-x64
3advanced-m...nfo.py
windows10-2004-x64
3advanced-m...mer.py
windows7-x64
3advanced-m...mer.py
windows10-2004-x64
3advanced-m...12.pyc
windows7-x64
3advanced-m...12.pyc
windows10-2004-x64
3advanced-m...12.pyc
windows7-x64
3advanced-m...12.pyc
windows10-2004-x64
advanced-m...kup.py
windows7-x64
3advanced-m...kup.py
windows10-2004-x64
3advanced-m...sdm.py
windows7-x64
3advanced-m...sdm.py
windows10-2004-x64
3advanced-m...ger.py
windows7-x64
3advanced-m...ger.py
windows10-2004-x64
3advanced-m...ts.txt
windows7-x64
1advanced-m...ts.txt
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
advanced-multitools.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
advanced-multitools.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
advanced-multitools/main.py
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
advanced-multitools/main.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
advanced-multitools/plugins/Account-disabler.py
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
advanced-multitools/plugins/Account-disabler.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
advanced-multitools/plugins/Anti-grabber.py
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
advanced-multitools/plugins/Anti-grabber.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
advanced-multitools/plugins/Group-spammer.py
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
advanced-multitools/plugins/Group-spammer.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
advanced-multitools/plugins/Serveurlookup.py
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
advanced-multitools/plugins/Serveurlookup.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
advanced-multitools/plugins/Tokeninfo.py
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
advanced-multitools/plugins/Tokeninfo.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
advanced-multitools/plugins/Tokenraid.py
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
advanced-multitools/plugins/Tokenraid.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
advanced-multitools/plugins/Webhook-info.py
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
advanced-multitools/plugins/Webhook-info.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
advanced-multitools/plugins/Webhook-spammer.py
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
advanced-multitools/plugins/Webhook-spammer.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
advanced-multitools/plugins/__pycache__/numbers.cpython-312.pyc
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
advanced-multitools/plugins/__pycache__/numbers.cpython-312.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
advanced-multitools/plugins/__pycache__/phonenumbers.cpython-312.pyc
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
advanced-multitools/plugins/__pycache__/phonenumbers.cpython-312.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
advanced-multitools/plugins/lookup.py
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
advanced-multitools/plugins/lookup.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
advanced-multitools/plugins/massdm.py
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
advanced-multitools/plugins/massdm.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
advanced-multitools/plugins/pinger.py
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
advanced-multitools/plugins/pinger.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
advanced-multitools/requirements.txt
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
advanced-multitools/requirements.txt
Resource
win10v2004-20240802-en
General
-
Target
advanced-multitools/plugins/massdm.py
-
Size
4KB
-
MD5
355a85e0fe2efdc9d6e1e68a332590bc
-
SHA1
0df3b1db9be77abf34c68b0fec301f127d6d914d
-
SHA256
7548d7deaead134f228ebe85caf406cea952abd67df868f82597db4a7d912d75
-
SHA512
cbc014589634fd676af7db9d98e1fef72e1c8ead8d98f09c079c3863b5040ead50347e5cf8a9f5dc16f08de716109a24380b65ca47e1b3d7acf41d90f8f75d9d
-
SSDEEP
48:35GjHa45imokED6dDpJm2qZ0gxpqep4Y1EWa4qugDGLKNTKpUl:JGjHaGz22Lgxpqep4YHa4qu2WampUl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2900 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2900 AcroRd32.exe 2900 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2256 1532 cmd.exe 29 PID 1532 wrote to memory of 2256 1532 cmd.exe 29 PID 1532 wrote to memory of 2256 1532 cmd.exe 29 PID 2256 wrote to memory of 2900 2256 rundll32.exe 30 PID 2256 wrote to memory of 2900 2256 rundll32.exe 30 PID 2256 wrote to memory of 2900 2256 rundll32.exe 30 PID 2256 wrote to memory of 2900 2256 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\massdm.py1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\massdm.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\massdm.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59a2725714ea160d435a9fe7e8059b0f9
SHA14241026dd69a9022e61abd0a1a0161b2822b9806
SHA2567492ded0cc6c09643489c1b16ba9322fdd2459e15bbcb4fe3cde374b0ba3c85d
SHA512ea58dcaf96357df28ba2cc5ab13c4c8eb4a9b6139f3c351fcabf968030930120ad24fe0d2e3d245d313727c5627069c62ea6b2a7f327e9381ad0c7de2ba46758