Analysis

  • max time kernel
    18s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 01:19

General

  • Target

    Stub.pyc

  • Size

    875KB

  • MD5

    362a5b1efbbda44240533e13cad8f122

  • SHA1

    d90715b86e44fba5383c967c1d36e6ac15b38e47

  • SHA256

    9318ab1fefde5fdbb18fb4bc01cd29c5c048565b1a07b049874bea3d90041aed

  • SHA512

    fa771ae4cc93893582941ec9d1f66d2bc96bd16ecdbaf7974d1c8638a890ba790efd23554827816e9e1bdb91fab16751ef691da72b8f20a0af2bb46f23540688

  • SSDEEP

    24576:YfnsmgKBdjdB4fjWIS/BRSVgYIjYR4KYpqhNaarU:szj4fujMmnpiaaY

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e39a27ea674b060d3a1e279df8a49c2e

    SHA1

    5eace08212345c12c17d9adec67914b0ded6b3cc

    SHA256

    0844cd1020e0409082a5ab4942a4f8354878f9f07cf25253775aefb7135a87fe

    SHA512

    637160bc190664a8f6559742ea4fb05e9115fb50835c4e679d43020ca2cb0f008419fc3c6f285ff1d1df3f739e9480a8708b20bff92d572f9305cb1d215a9497

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.