Analysis
-
max time kernel
102s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 15:43
Static task
static1
Behavioral task
behavioral1
Sample
download_us.py
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
download_us.py
Resource
win10v2004-20240802-en
General
-
Target
download_us.py
-
Size
2KB
-
MD5
303a002f7a9caab24a91b6f7db993c33
-
SHA1
5dfd8749c35d85fb895d8ca3e5762390619af020
-
SHA256
16057f42fa1a8e8bc8c299bfeda91df4849100a0f998d45db24d4df71e9b324c
-
SHA512
555803adf0da73cd9fad3d738b4e144fb941669117d9e2f035755c33595b4bb05f40a02cd0636828fb6158d8f65db563d083f8dbe93d7b89866d597366e9b165
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3024 AcroRd32.exe 3024 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2844 1756 cmd.exe 30 PID 1756 wrote to memory of 2844 1756 cmd.exe 30 PID 1756 wrote to memory of 2844 1756 cmd.exe 30 PID 2844 wrote to memory of 3024 2844 rundll32.exe 31 PID 2844 wrote to memory of 3024 2844 rundll32.exe 31 PID 2844 wrote to memory of 3024 2844 rundll32.exe 31 PID 2844 wrote to memory of 3024 2844 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\download_us.py1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\download_us.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\download_us.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53509ab7b667fb6bc08923bdfeed818e0
SHA1fcd6ea6573f425f3bfad0a5129237d7367dfa19c
SHA256dc96ac18f695ec292a3f4f29eb253ea6d043e37c9f2b24c6af4de7da5d45e30d
SHA5127188facdd6ef11778c7a74f55a4b22eace201eeb40081a1914799d6c790960909e25ea3d1842d6adfe120ed086a07d84253f62efa4e0b58388a32477bf03ab7e