Analysis

  • max time kernel
    102s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 22:37

General

  • Target

    fetchai-uAgents-43e4d7b/integrations/distilgpt2/src/agents/distilgpt2_user.py

  • Size

    2KB

  • MD5

    7429622a44e697778ae9188a501f98c6

  • SHA1

    3abcb00397e86a3585db84dc13139bcc92dc7702

  • SHA256

    b89264349f9df91dbea1c54e0ad5e0ce57c611ccb17377bd8b07b2033abc96b8

  • SHA512

    33bd571d9ebfcf69e1077a520dd197d117a5eb63c62b2c82094220a7a2bef8f220aa77d215a4c42d6fcbb37ff80b02041a0755853709881adef31d8d50c138fd

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\fetchai-uAgents-43e4d7b\integrations\distilgpt2\src\agents\distilgpt2_user.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\fetchai-uAgents-43e4d7b\integrations\distilgpt2\src\agents\distilgpt2_user.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fetchai-uAgents-43e4d7b\integrations\distilgpt2\src\agents\distilgpt2_user.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2728

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          e6bf264c8b8eb7026ac710f344780e78

          SHA1

          b2bb82b81020bfad7095c33ac4884429f0284d6d

          SHA256

          465edeb7a3e17ed4047c2a6dc169631f66fd6e62bb2df22420e1a3f6c3b4c42f

          SHA512

          75782c4ae5a35ab087df5bf3040e196dd20260d3fe123d2ee3130319bf92876279f858ef07735dbee66bc9c09e6f40e2323a270acdd414b6c762e7830d3f9ccf