Analysis

  • max time kernel
    103s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 01:20

General

  • Target

    auto_rig_pro-master/src/auto_rig_reset.py

  • Size

    3KB

  • MD5

    a081b20afc19d700b7c7710461c75a98

  • SHA1

    469be569c0d24ab844f3e1513bf7688b4efb1c11

  • SHA256

    072f839143ea663b58f108b0be46374428f8dc8757e2b72a31e73a2cfe057894

  • SHA512

    3e61cb7c52e36c280c62d375e083f0e4d62a815b1de88a77abde4026a9a6e4f4bdeb8031bce1e1cad499a40978a22c86aa1ac4ed581d6c9efa52591aeba0d583

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\auto_rig_pro-master\src\auto_rig_reset.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\auto_rig_pro-master\src\auto_rig_reset.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\auto_rig_pro-master\src\auto_rig_reset.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    b3a0bdd6829493b829e77ce18d3ed98b

    SHA1

    2eb9033f9658f0ab4754f1b1d81952e82dfe5132

    SHA256

    712b9c4e8d11e7ca40ad7e81a5c4da76bcc2587cf85b09647d54b67c748b0331

    SHA512

    4c8b23c337c6d6bd878d4ae85b1cb02733551e86f97f077a08107f48de0a1c224da15ba5afeb4f82b688e9434ad5908d2fc5d02be738828c4c259503b04b276e