Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
OpenMe.py
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
OpenMe.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PluginStarter/StartCola.cmd
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
PluginStarter/StartCola.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
python-3.12.4-amd64.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
python-3.12.4-amd64.exe
Resource
win10v2004-20240802-en
General
-
Target
OpenMe.py
-
Size
503B
-
MD5
89f9c3eefdfb8ac2f5512c37831041d2
-
SHA1
ae680be1207291d5207072ca81283b6877d0b4b3
-
SHA256
9a10f144b4a040934cddbcf91426622805a5670e95c19bc86d434811971db973
-
SHA512
8a83123c18535533291f6d2742f1ef6eb24b9faec66bd682ccad3532d087bce438f44e7f912554b97d48ff9f3b4e78c7955b8f5af470a72d480f69c6f8dd6869
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2364 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2364 AcroRd32.exe 2364 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2252 wrote to memory of 2740 2252 cmd.exe rundll32.exe PID 2252 wrote to memory of 2740 2252 cmd.exe rundll32.exe PID 2252 wrote to memory of 2740 2252 cmd.exe rundll32.exe PID 2740 wrote to memory of 2364 2740 rundll32.exe AcroRd32.exe PID 2740 wrote to memory of 2364 2740 rundll32.exe AcroRd32.exe PID 2740 wrote to memory of 2364 2740 rundll32.exe AcroRd32.exe PID 2740 wrote to memory of 2364 2740 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\OpenMe.py1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\OpenMe.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\OpenMe.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f70b7f9e9c5304d448ee61017ea4fa3c
SHA138258447037aa173c451096c0f269db044bc6a4e
SHA25699b4ce60cd32460dc6a2c2aa711c37fc30d0209b99eef359857fde24d55695c8
SHA512557bcb8e6995385f234d22e43d56ccd84dac829711c1b94c5beef308156266e197d45a2d921975a97ce04a03b222e2b048eb99f3ab0b76ddbcf94370afb73b25