Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 14:55

General

  • Target

    Data/Python/Lib/site-packages/numpy/__config__.pyc

  • Size

    4KB

  • MD5

    f437364d2613a2ec94f3e9fa1a25b3c2

  • SHA1

    387b36e4aad36c2cdfe43544b92569c76ce40e27

  • SHA256

    1988d54288fe56542cb27a229a5ea17a9f6544bff06021ddac78fdc8e08cbb88

  • SHA512

    91a13dd37908b70640c299d668caad905baaf18d291fe0d13ae595839caf31d6b5f5f6b7e96b707c121469d88d5c9ddd2c3108f9abb445e323573002bbe7c882

  • SSDEEP

    96:d+7IOympDjc4i18dzYpPKK08BBsIy5kezTTafH122eCayrZrpavQ00oqq7+d:vOjuAcPK3rgLnaCZIQ05qq7+d

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Data\Python\Lib\site-packages\numpy\__config__.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Data\Python\Lib\site-packages\numpy\__config__.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Data\Python\Lib\site-packages\numpy\__config__.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    bb5e2cc148df07597aedd14221397227

    SHA1

    6841204a10aa20f8415b0a031d02cc687d6fe10f

    SHA256

    be76c2ec00fb61c6cc9b3c8d3309d353594ddfb40cc56e47b8492f5188e7bad5

    SHA512

    98d8ec70bdbb7af6e052425f75b0c6107d7848a98e6aed576417d45e1e8fbfb45b35a47ce489a5b45e78e19cbfa4cfecec02ff0f69d197f953b7e9f13a6a11e4