Analysis

  • max time kernel
    102s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 01:20

General

  • Target

    auto_rig_pro-master/src/auto_rig_datas.py

  • Size

    57KB

  • MD5

    feabb94ae25a3d5472881c88b326ecc7

  • SHA1

    002a0da036d127fa8639721a9209168be7681573

  • SHA256

    1ceb397d8edaf62ed51343dfaa35e1163c4c66a8dbc1f95ae1951e11971d611a

  • SHA512

    eafb5b98d702b2861c27d938794db1cb3faad0299ec972290bb7da0618eb4b078f325600a987ad18cfb263e3edff627a3f9ca4841e4c446b1568962e04018e85

  • SSDEEP

    1536:OZLtlOV4VqBegJJboOb7EtsOnL3B72cbM8r:Ba2egJ2Ob7EtsOnL3B72K

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\auto_rig_pro-master\src\auto_rig_datas.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\auto_rig_pro-master\src\auto_rig_datas.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\auto_rig_pro-master\src\auto_rig_datas.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    49082a1418bd2a06edf050563734e943

    SHA1

    a29f64da1cc7bfee087b737a852deff61e5aed18

    SHA256

    f4c8070524a0ff2f111713784f153569e21c151f459e4d29582ce7e791a64368

    SHA512

    5f32981316093fe6ccb87e1dfeda29840ee3e7d49651211ac96a99deb8f3e7e2cd340ac5ac08d0910713694e40f9f6af265da90040aa2f1c8ace3a8bbdc02f2f