Analysis
-
max time kernel
25s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-es -
resource tags
arch:x64arch:x86image:win7-20240708-eslocale:es-esos:windows7-x64systemwindows -
submitted
31-08-2024 04:02
Behavioral task
behavioral1
Sample
Skin Changer.exe
Resource
win7-20240704-es
Behavioral task
behavioral2
Sample
Skin Changer.exe
Resource
win10v2004-20240802-es
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240708-es
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240802-es
General
-
Target
Stub.pyc
-
Size
198KB
-
MD5
bf50be6023ad3852cf8dafe71ae0149e
-
SHA1
a497396e43fd9bd19f699293f4a043283f6ce997
-
SHA256
45dc909ea64b61dea3cc8aea2e85aede247f7970915c3ef18451748146c7a79c
-
SHA512
4a98130ae575ad3a32e9801eb5354ad760e7dbec505f7216909ed391aa7f21d17f81a9d3cb386bf51451a4345f6bca4fe0236e2d68ac779400641493fa7a50b4
-
SSDEEP
6144:MeYPhr47CTpKfTgYhYYYYY9YYjTFlZE1l:5spAsFlZ+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2832 2740 cmd.exe 31 PID 2740 wrote to memory of 2832 2740 cmd.exe 31 PID 2740 wrote to memory of 2832 2740 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2832
-