Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 01:20

General

  • Target

    auto_rig_pro-master/src/export_fbx/encode_bin.py

  • Size

    14KB

  • MD5

    6a89827a4714b7a544e53856864b083b

  • SHA1

    95076d235d856d87a6a377c9356ba42618695978

  • SHA256

    7132cebd56d6f1d44aed764ecb8a864e40fca423244e1f80878d0c488a3d5526

  • SHA512

    6436af86a7fbab07ebd193719b2aa07a188f7119ab6d0ce1727622bc34a28d37a6aa05f12ec900e95f549d32050ac4c3b03d1caca82711523d4e02d3c47a17b2

  • SSDEEP

    192:zDCEgnMF6H52cCxlFhJXyMBjdWMrmUqSd/s+eD+hYt32s:zDZgnMFnlF3r0e5l42s

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\auto_rig_pro-master\src\export_fbx\encode_bin.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\auto_rig_pro-master\src\export_fbx\encode_bin.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\auto_rig_pro-master\src\export_fbx\encode_bin.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8108db717c46cdd584fea334d79071c2

    SHA1

    edaf6ddf4d786bf2331dc52220ca3d1a96d5df06

    SHA256

    8c4f73ec47fc4b1f57231b951695f698520c29b5848f3ef7ebac2f7cea99477b

    SHA512

    c565ec490d735be763990bfa332e39450d69e9c054f6d598a63480bb35f10d4ff664687c76c643149921b541bb19c8dcf6fdff27d408dfd5d74a7234b815ded5