Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-08-2024 18:02
Behavioral task
behavioral1
Sample
LegoFlashAudio.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
LegoFlashAudio.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240802-en
General
-
Target
Stub.pyc
-
Size
875KB
-
MD5
0d0ff93354f2c12d04ce8581ae473a9a
-
SHA1
58555375e35d3b3c558197ae90d6a7665ad6dbe1
-
SHA256
481d6df15205ca132f44c25aceede803fa15f9917ae7359868249bb776b3005e
-
SHA512
3314d6e0ff931361b568e24790917a266ad4f1fabe0b7b5aeb38a9ff05cf8ac362823df2f618f4253fe9b21e445c5d0c3adb2559cf9282f4e32094eded277277
-
SSDEEP
12288:+ksSARVqZfOMfVFVr0Vfs2CN4JV/fe4DaJOq/buz24/BKYos9JBdNL9bOefN:2FRVOtF+k2AK7aJt/74/QJs9pxNV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\pyc_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2764 AcroRd32.exe 2764 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2900 2096 cmd.exe 31 PID 2096 wrote to memory of 2900 2096 cmd.exe 31 PID 2096 wrote to memory of 2900 2096 cmd.exe 31 PID 2900 wrote to memory of 2764 2900 rundll32.exe 33 PID 2900 wrote to memory of 2764 2900 rundll32.exe 33 PID 2900 wrote to memory of 2764 2900 rundll32.exe 33 PID 2900 wrote to memory of 2764 2900 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c7ec7a846024272250a0b4f4e2d922dd
SHA18f6a382ce217eeea70aa01eed5bb367e1f2591a4
SHA256b438785271883f8dbf876ce421872aa866d9c13af0819ff0c203474a5fb18668
SHA5122ef01c32fc7ac8bcdd9d00bfa32ab4da1223264d11a08eacc905e13a6564eaede048942da853a340814ce9ce37abeeb0c7c31edbea1a27fb97c7024a7c61b9e4