Analysis
-
max time kernel
102s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 20:57
Behavioral task
behavioral1
Sample
installpy3.8.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
installpy3.8.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
venz.xyz.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
venz.xyz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
x.6xyyn.py
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
x.6xyyn.py
Resource
win10v2004-20240802-en
General
-
Target
x.6xyyn.py
-
Size
428KB
-
MD5
b0db11ccf6cc25f90b6549b2ac8b4be6
-
SHA1
06505b3e55fea1b45b354ec254948917cc9b7f20
-
SHA256
ea144323b74c05280c4fa2032103775cfae4969f8b9b08b8c32d686f0f48b647
-
SHA512
cb73ff1a0f06d748c1ebc7e648b07cfdff7d89b8c40029625af88eef87ca3d7eb79176970404a8d6c35ccf9958cdc3fe4531fc75799408986b0bb294972cca16
-
SSDEEP
6144:Gsuvg0QTXyAPKah7y8c0vJuQP1CJTqTAHvYzIBTREvR8KCOum7k3muBRhRam7mYQ:L
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\py_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2512 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2512 AcroRd32.exe 2512 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1716 2876 cmd.exe 30 PID 2876 wrote to memory of 1716 2876 cmd.exe 30 PID 2876 wrote to memory of 1716 2876 cmd.exe 30 PID 1716 wrote to memory of 2512 1716 rundll32.exe 31 PID 1716 wrote to memory of 2512 1716 rundll32.exe 31 PID 1716 wrote to memory of 2512 1716 rundll32.exe 31 PID 1716 wrote to memory of 2512 1716 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\x.6xyyn.py1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\x.6xyyn.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\x.6xyyn.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f3f25920773efac267cfea730c9067e3
SHA13c41c67d4e85b9920059a99476daccd39b6bdd5e
SHA2565f422984229595b15e7637222a8d0a3e4401adff4eceaf822e5face5db4724fb
SHA5121b79fbeb9f1661a186e9214ac16490a9090bdb6fd460ebe26828f86ea003b15387c7ea466647491854e686bfd20a7407bdd445a589deb6f33dc8ae03092d0ce4