Overview
overview
10Static
static
10utopiaclient-main.zip
windows7-x64
1utopiaclient-main.zip
windows10-2004-x64
1utopiaclie...AR.txt
windows7-x64
1utopiaclie...AR.txt
windows10-2004-x64
1utopiaclie...ME.txt
windows7-x64
1utopiaclie...ME.txt
windows10-2004-x64
1utopiaclie...cc.txt
windows7-x64
1utopiaclie...cc.txt
windows10-2004-x64
1utopiaclie...am.txt
windows7-x64
1utopiaclie...am.txt
windows10-2004-x64
1utopiaclie...ds.txt
windows7-x64
1utopiaclie...ds.txt
windows10-2004-x64
1utopiaclie...nt.exe
windows7-x64
7utopiaclie...nt.exe
windows10-2004-x64
9main.pyc
windows7-x64
3main.pyc
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-08-2024 05:11
Behavioral task
behavioral1
Sample
utopiaclient-main.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
utopiaclient-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
utopiaclient-main/AR.txt
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
utopiaclient-main/AR.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
utopiaclient-main/README.txt
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
utopiaclient-main/README.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
utopiaclient-main/gcc.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
utopiaclient-main/gcc.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
utopiaclient-main/spam.txt
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
utopiaclient-main/spam.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
utopiaclient-main/userids.txt
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
utopiaclient-main/userids.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
utopiaclient-main/utopiaclient.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
utopiaclient-main/utopiaclient.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
main.pyc
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
main.pyc
Resource
win10v2004-20240802-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
f21ebb28620e7b90532854f8bf322a5f
-
SHA1
0d2813510f69ca5a209538ce2101861bb6086e85
-
SHA256
9eed4d3a6fda183d4123ffa45d653f05f230096d257e6824f639d72c491c5554
-
SHA512
16e35c90b3e86ace50edc84caf22b246e505a02a446678c4362403d32d75c2fdb11632033873c9fc26a827e7e45bf93ff12db510d27db4114728bf11d72b5b1a
-
SSDEEP
192:wBmeDHmCD8Ei4cAWdXwwqdcl4laDKJhwTuzMdwqnw:YmeDmoNZWuP2u2SzPqw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\pyc_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2552 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 AcroRd32.exe 2552 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2672 2160 cmd.exe 31 PID 2160 wrote to memory of 2672 2160 cmd.exe 31 PID 2160 wrote to memory of 2672 2160 cmd.exe 31 PID 2672 wrote to memory of 2552 2672 rundll32.exe 32 PID 2672 wrote to memory of 2552 2672 rundll32.exe 32 PID 2672 wrote to memory of 2552 2672 rundll32.exe 32 PID 2672 wrote to memory of 2552 2672 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a7f2529e2fae8394521aab2268e22e12
SHA1b9d6629fa6d8adca2c4a44d3b21d202e6940c72b
SHA2569e93a9a717a6958188417dce309042b00ed33e9fd2a77d2fa646cdaff0eeaaaf
SHA5121a6aec3d2cd43de78c3be218e0e9602236f2268d6ac35bc9ed0978c2bc1c1bb2fd17b8e152848e575cc7565b36bfa5b93ef41b3f8a63a305ca4174959412acb3