Analysis

  • max time kernel
    121s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 22:37

General

  • Target

    fetchai-uAgents-43e4d7b/integrations/fetch-ai-engine/src/ai_engine/types.py

  • Size

    814B

  • MD5

    16e95fc7a399f8ea591e488c550e4913

  • SHA1

    cabfdb91cad274b87007bb2deb51921b5a3976bb

  • SHA256

    fcfa04b0a8f9bf666207d0ee4a41cbede978ccd63355f7a67467138ef493066c

  • SHA512

    c7c708c675092f53c2fee901af7927ecd4b2d71ab4bb79c6c01b177a7d7537e9abe0799092be1da0763830cad78c0a6782fd1dd988c7eb08fb83ca3c5aa91a89

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\fetchai-uAgents-43e4d7b\integrations\fetch-ai-engine\src\ai_engine\types.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\fetchai-uAgents-43e4d7b\integrations\fetch-ai-engine\src\ai_engine\types.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fetchai-uAgents-43e4d7b\integrations\fetch-ai-engine\src\ai_engine\types.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    3e60b6116d01659bfd842703823907dd

    SHA1

    70e8473b1568ab690b1f217c345a8bc20f58b57a

    SHA256

    2838030e68ced41944071945b85b392511ed8ae92b1a8be9645aa31776a65c12

    SHA512

    2cefed70b888ad7af443f7c269b3bbaa60f9119ea0eb14b7af2630323cbb3f20124140f807f87a64f7707de45f2ac2ee8545c7799e7da866dd78f09cd81b202f