Overview
overview
3Static
static
1advanced-m...ain.py
windows7-x64
3advanced-m...ain.py
windows10-2004-x64
3advanced-m...ler.py
windows7-x64
3advanced-m...ler.py
windows10-2004-x64
3advanced-m...ber.py
windows7-x64
3advanced-m...ber.py
windows10-2004-x64
3advanced-m...mer.py
windows7-x64
3advanced-m...mer.py
windows10-2004-x64
3advanced-m...kup.py
windows7-x64
3advanced-m...kup.py
windows10-2004-x64
3advanced-m...nfo.py
windows7-x64
3advanced-m...nfo.py
windows10-2004-x64
3advanced-m...aid.py
windows7-x64
3advanced-m...aid.py
windows10-2004-x64
3advanced-m...nfo.py
windows7-x64
3advanced-m...nfo.py
windows10-2004-x64
3advanced-m...mer.py
windows7-x64
3advanced-m...mer.py
windows10-2004-x64
3advanced-m...12.pyc
windows7-x64
3advanced-m...12.pyc
windows10-2004-x64
3advanced-m...12.pyc
windows7-x64
3advanced-m...12.pyc
windows10-2004-x64
3advanced-m...kup.py
windows7-x64
3advanced-m...kup.py
windows10-2004-x64
3advanced-m...sdm.py
windows7-x64
3advanced-m...sdm.py
windows10-2004-x64
3advanced-m...ger.py
windows7-x64
3advanced-m...ger.py
windows10-2004-x64
3advanced-m...up.bat
windows7-x64
1advanced-m...up.bat
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
advanced-multitools/main.py
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
advanced-multitools/main.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
advanced-multitools/plugins/Account-disabler.py
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
advanced-multitools/plugins/Account-disabler.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
advanced-multitools/plugins/Anti-grabber.py
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
advanced-multitools/plugins/Anti-grabber.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
advanced-multitools/plugins/Group-spammer.py
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
advanced-multitools/plugins/Group-spammer.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
advanced-multitools/plugins/Serveurlookup.py
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
advanced-multitools/plugins/Serveurlookup.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
advanced-multitools/plugins/Tokeninfo.py
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
advanced-multitools/plugins/Tokeninfo.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
advanced-multitools/plugins/Tokenraid.py
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
advanced-multitools/plugins/Tokenraid.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
advanced-multitools/plugins/Webhook-info.py
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
advanced-multitools/plugins/Webhook-info.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
advanced-multitools/plugins/Webhook-spammer.py
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
advanced-multitools/plugins/Webhook-spammer.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
advanced-multitools/plugins/__pycache__/numbers.cpython-312.pyc
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
advanced-multitools/plugins/__pycache__/numbers.cpython-312.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
advanced-multitools/plugins/__pycache__/phonenumbers.cpython-312.pyc
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
advanced-multitools/plugins/__pycache__/phonenumbers.cpython-312.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
advanced-multitools/plugins/lookup.py
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
advanced-multitools/plugins/lookup.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
advanced-multitools/plugins/massdm.py
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
advanced-multitools/plugins/massdm.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
advanced-multitools/plugins/pinger.py
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
advanced-multitools/plugins/pinger.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
advanced-multitools/setup.bat
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
advanced-multitools/setup.bat
Resource
win10v2004-20240802-en
General
-
Target
advanced-multitools/plugins/Tokeninfo.py
-
Size
7KB
-
MD5
f3f0e0e9e57ce7eb34b98d8e585e3526
-
SHA1
ab834b04cef60cd6b8caea5d378875467f6ddaf9
-
SHA256
a871902dbb98ebbd83b4958b30f5b18d80cc5f435a3c42f33e62354a69fb8ba0
-
SHA512
df85815bf0525102ba6f24a7f8fafa1cf5dc3e5aa8a19891a6b8823c7fc2b41897e806e3f6a995345af61b24cf05658321f8ec4657d0712ddad072cb4c3229bb
-
SSDEEP
96:5nK3bpWsnUv8yle5RttEzFgimZqv/K6OGFSwcqm7EIhxdsN6zw7GbK6co2ZA08pa:2U3eHEzFdm6Gdc6EsK6b2ZAoSM5v1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\py_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2888 AcroRd32.exe 2888 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2972 2420 cmd.exe 31 PID 2420 wrote to memory of 2972 2420 cmd.exe 31 PID 2420 wrote to memory of 2972 2420 cmd.exe 31 PID 2972 wrote to memory of 2888 2972 rundll32.exe 33 PID 2972 wrote to memory of 2888 2972 rundll32.exe 33 PID 2972 wrote to memory of 2888 2972 rundll32.exe 33 PID 2972 wrote to memory of 2888 2972 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\Tokeninfo.py1⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\Tokeninfo.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\advanced-multitools\plugins\Tokeninfo.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ab11e0d90b79b35d635dc9b0bd9700a0
SHA1eceb08cee8122355ccdcaffb8a287f1acef040c9
SHA25602e26d41b91be93e8dcc2e586431a9e1f9dfe0b9bb0a6bb1f16613d5a645c12d
SHA5122226a2a1a6ba2d50e53a565677d09e6feb6e5e17f4f653a56c65efab0dc20be0eb197f2faa1fb08b10e729bcf97f53fad50e96a12ed4a383b5ed560fb8d734d4