Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 11:12
Behavioral task
behavioral1
Sample
SpotifyLyrics.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
SpotifyLyrics.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
SpotifyLyrics.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
SpotifyLyrics.pyc
Resource
win10v2004-20240802-en
General
-
Target
SpotifyLyrics.pyc
-
Size
22KB
-
MD5
02fe75ab006ed26fdf97cac9a5d98da3
-
SHA1
c9a98b7bd99f2eb6efa34c218917af9d1200ec17
-
SHA256
c3e8780fb44b476551043332d26f548689bd901a0dab122e6230f24754bb7a3b
-
SHA512
31717b3f4135ad71f5cfd8310bb17b484687fbfd6143cf8580c9498fa3cef1cfab5534dda0147aa0f71b49660a8ce8b381e19abf83b7736879f5b2208e1c4e73
-
SSDEEP
384:3jH4BTi/TeEWeob68BJXgns/9e/XwsoDsBNqiLQydQyWRbi9T1LXlWMx+C:TYBTi7eEWeQ60Xmsle/nBqaQyd3WhiPr
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2852 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2852 AcroRd32.exe 2852 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2396 2076 cmd.exe 31 PID 2076 wrote to memory of 2396 2076 cmd.exe 31 PID 2076 wrote to memory of 2396 2076 cmd.exe 31 PID 2396 wrote to memory of 2852 2396 rundll32.exe 33 PID 2396 wrote to memory of 2852 2396 rundll32.exe 33 PID 2396 wrote to memory of 2852 2396 rundll32.exe 33 PID 2396 wrote to memory of 2852 2396 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SpotifyLyrics.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SpotifyLyrics.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SpotifyLyrics.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57be47e41df235e2812f84dbd30df1984
SHA19ef8652d86baae73da2f54517be459cb827fe273
SHA2562f2cd7d7c8341c7c54071d6ef94aca2420e7ef91b979efb838427d8a323aa959
SHA5128bb8416524bfbc6c8bbc29ca88ce1471566e95c0a2925876f3462a0728a435a35b27381f0fcf972c991030d873fd443f79d69a2f0998313aaf18556f18381620