Resubmissions

12-08-2024 16:01

240812-tgbw8sybrk 10

12-08-2024 15:48

240812-s9adfasdjc 10

12-08-2024 15:43

240812-s56abaxfnm 10

12-08-2024 15:37

240812-s2n7maxdrr 10

12-08-2024 15:33

240812-szev6s1hnf 10

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2024 15:33

General

  • Target

    source_prepared.pyc

  • Size

    180KB

  • MD5

    d369c714784ef9a0997cc1f96684783b

  • SHA1

    abb93c00507d16ad2b69c58419658e68a1d60b0b

  • SHA256

    54d791d5af261958556d47142bee29ca8c1de92e7ea3b9cd1def67e0b5ff8413

  • SHA512

    1b1da9ff31bd4c70f1729d9ba6550deae07b523878374082ff5a3fe7e5e854b9c4ab8c5defbe95c43cf29cb1ed4303a3452d3902515a74430a23a11f9e86f5df

  • SSDEEP

    3072:UoLas5A9M2YGoFPEtelZN+thZaCSc1gbdXhCknW:nWsMIGoF8cN+rZaCSWgbdRCr

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f1e9ea949d1def32393dc0f76fb8163d

    SHA1

    fdd9c268f199e8b03571494a4365a5012b45e0a0

    SHA256

    02b438390c5a125c27621833f0040249adf427cd17b441a13e3beb1d6b755f1f

    SHA512

    c6c7af636c6d9b7cfea550e3620e0634c39a287dd962e824b32e18c03563468be4c178ff6cc5d42e4e794afed2f99f1217e46b8f1b4acf125ee448ea17958b98