Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 22:41

General

  • Target

    source_prepared.pyc

  • Size

    65KB

  • MD5

    e50da1d9f98c091dd1790d5554792953

  • SHA1

    1aaaeafd603289f2a16771ef08cb913034c19f74

  • SHA256

    197975788127b019c6e8a6b13a2e2d57d6478e921d350af557abdfb239a69ad3

  • SHA512

    33f0188e619d9b7818b14e41931b347ffe10b2febd17a02698a13af733c0ef86e90f4f47a8a81f52c3a40553d3f09945ea9cf5c57561aa6d39f05ae903a71f94

  • SSDEEP

    1536:20jFQgVgJPkBBj1uYCFjUIOihdBsoGwjRQ5J:ag2FkBkFwIOCsoD2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0bb61b3a189895fed2d26147e9007ff4

    SHA1

    41f4e370989c5e4985ad8fc64a99f5d9ce0995e8

    SHA256

    47d68e7dc7936b179ae514b2628d0d77a52c0f4dd45c3188d121fecad030ccfa

    SHA512

    32f10dbb39c5d9e06111dd5b709edda64bd057702bae126c56479095ea01db1992081f0ae5f5b0986a34dd2c90badf923e3cf2e8981529a4d95bdf4e7f514701