Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 11:24

General

  • Target

    Stub.pyc

  • Size

    873KB

  • MD5

    57f821911a18370cb3cb4b6c0b0c9247

  • SHA1

    145bc4d4c5502b0bebf33be986142089dac72fa3

  • SHA256

    930887e5aa621cd70bf8aa135597c2c25de2f75ce98f037125a9284041e8cb4e

  • SHA512

    a4b37561bda703f6f54f2418b51d18de57cc45e756af108d0fb44cffcdfb756bf1fa239b49b149dc9ba1471db4e8d33d6a42875860babe3b86e3ca166781a82b

  • SSDEEP

    12288:aENpKFS56t+VCpCT79CVSHHARiEdXJrM+J614jbjBAG4Oe9F4+amMWk5m2nP:aKn5+9UeAHAjmw6ED51mbc

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    86a68dc7b379f93431f4874b901a01fa

    SHA1

    df87ba60d8eb35faebf2940212318a66f825aa0d

    SHA256

    2e9112fa4f06b44d99142e2c0618cc783549087f45be5d81b85869435ae192ed

    SHA512

    0123535afe6cc60f9882fcf9d27a5d83b4f32bab33061cf7438b11e3596221f144fecaae69b1eb7e1952c3c309fb6d340a5cab44eeccca1ba4d9124619f1b2a1