Analysis

  • max time kernel
    103s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    31/08/2024, 07:43

General

  • Target

    get_cookies.pyc

  • Size

    9KB

  • MD5

    a12cc942c6a47419199f4b8d1a7a7610

  • SHA1

    b4b768ca3b4a69defbc3e7d3e0f9c6df838f88a2

  • SHA256

    de06ce32e8f7524238899d0478dfaf2c1530f1444ba1d61ff074a35e6ade4a0c

  • SHA512

    1c6c19e937e2e9517bcdf44927356de6bd5a850a920eb5c82e0885755ce245830e92b7fe2f15dfd4c02237bc5dd4b6f09c22fd68cb70fd9d15605eda620a4753

  • SSDEEP

    192:kNal3eiNis9QfUF2x3NC79F211G6qEtAhN:kJiB2XtF7jqkAhN

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    9eaa2d78c78265e3807d56e00c3368f0

    SHA1

    c8349ef39d4fe9a7973e74e7084239be40a73135

    SHA256

    7210b06b328559b66903e507ddc061e68e94c68627010947ea1ef590d1c5e31b

    SHA512

    5fcf51146f912d3f52a191a1283023a2908f8a12ce6a73e05f8a36fd3875cad09e955889765d981479f53ea0983a9fafe1e8bb0d1b50133e0b64b520182d9360