Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2024 18:02

General

  • Target

    Stub.pyc

  • Size

    875KB

  • MD5

    0d0ff93354f2c12d04ce8581ae473a9a

  • SHA1

    58555375e35d3b3c558197ae90d6a7665ad6dbe1

  • SHA256

    481d6df15205ca132f44c25aceede803fa15f9917ae7359868249bb776b3005e

  • SHA512

    3314d6e0ff931361b568e24790917a266ad4f1fabe0b7b5aeb38a9ff05cf8ac362823df2f618f4253fe9b21e445c5d0c3adb2559cf9282f4e32094eded277277

  • SSDEEP

    12288:+ksSARVqZfOMfVFVr0Vfs2CN4JV/fe4DaJOq/buz24/BKYos9JBdNL9bOefN:2FRVOtF+k2AK7aJt/74/QJs9pxNV

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    c7ec7a846024272250a0b4f4e2d922dd

    SHA1

    8f6a382ce217eeea70aa01eed5bb367e1f2591a4

    SHA256

    b438785271883f8dbf876ce421872aa866d9c13af0819ff0c203474a5fb18668

    SHA512

    2ef01c32fc7ac8bcdd9d00bfa32ab4da1223264d11a08eacc905e13a6564eaede048942da853a340814ce9ce37abeeb0c7c31edbea1a27fb97c7024a7c61b9e4