Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 14:29

General

  • Target

    afk.py

  • Size

    2KB

  • MD5

    cf09dbf80cbe7642a045f9bd077883dd

  • SHA1

    d869f10cbe4c29d3d821b82b279de4accddb8bbd

  • SHA256

    a2ccb45af3cb8b0492c2fa3e650ea05d52f5d49ae0f30a1f1a5529c64bdbabf1

  • SHA512

    41df19dc68cad2dee897a9f29abe7509c796e8e2f223f1f16908bcf0949fc4776a34ff84b5fde8cc5231b85b919972f51eb5d993694b109f87f11e088ce66dc0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\afk.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\afk.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\afk.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    237042120b487f4e12c41a7271e91cb0

    SHA1

    3398e804306b15e6ec28292ef445abfea88415d5

    SHA256

    6e91f02508db93401a7bc729dcec99548b550642352254d395dae52aa89bbbed

    SHA512

    4a59d01aefdae9c54410c89e8b673c84d87c1dc1b32c31a168d46b27be75c082d9cc315fb2c34dd617fa433e2a76ee98b13fdf4046a7b63273630899e57ca2cc