Analysis
-
max time kernel
32s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 01:19
Behavioral task
behavioral1
Sample
ElectronV3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ElectronV3.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240802-en
General
-
Target
Stub.pyc
-
Size
875KB
-
MD5
362a5b1efbbda44240533e13cad8f122
-
SHA1
d90715b86e44fba5383c967c1d36e6ac15b38e47
-
SHA256
9318ab1fefde5fdbb18fb4bc01cd29c5c048565b1a07b049874bea3d90041aed
-
SHA512
fa771ae4cc93893582941ec9d1f66d2bc96bd16ecdbaf7974d1c8638a890ba790efd23554827816e9e1bdb91fab16751ef691da72b8f20a0af2bb46f23540688
-
SSDEEP
24576:YfnsmgKBdjdB4fjWIS/BRSVgYIjYR4KYpqhNaarU:szj4fujMmnpiaaY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3700 OpenWith.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 3700 OpenWith.exe 4084 AcroRd32.exe 4084 AcroRd32.exe 4084 AcroRd32.exe 4084 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3700 wrote to memory of 4084 3700 OpenWith.exe 98 PID 3700 wrote to memory of 4084 3700 OpenWith.exe 98 PID 3700 wrote to memory of 4084 3700 OpenWith.exe 98 PID 4084 wrote to memory of 1412 4084 AcroRd32.exe 100 PID 4084 wrote to memory of 1412 4084 AcroRd32.exe 100 PID 4084 wrote to memory of 1412 4084 AcroRd32.exe 100 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 4916 1412 RdrCEF.exe 101 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102 PID 1412 wrote to memory of 3156 1412 RdrCEF.exe 102
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Modifies registry class
PID:4460
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=929C69A40BCFE1034C0A3C47F79E9098 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4916
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D240E9C76BD0C9FC5FC8D99485EAC31C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D240E9C76BD0C9FC5FC8D99485EAC31C --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:3156
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4C42AAFCF0541267D85F8D516AEF6542 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FEDC37E110A9364EA2C451D0E042B11D --mojo-platform-channel-handle=1824 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1776
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=35B4159A64FC290BDF2341D53CC12C33 --mojo-platform-channel-handle=1912 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1216
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4908