Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 10:34

General

  • Target

    prebuild.pyc

  • Size

    244KB

  • MD5

    ea2dbd6f1b1d4131871713028269225c

  • SHA1

    4587bebed06ce225034653ac369ed23c0cb9162d

  • SHA256

    6e98f771b39c2ae812542fd568163aeee0b2ea518b5df8116be63819fe155d81

  • SHA512

    303b498e1a89385d1136be22be6df668332a47614246f0550d0b8fcd4fd1578378f9769ec335a21a5c8c2ee3424954cf298a613f514e5b59fc6abb7736fb4ca5

  • SSDEEP

    6144:7qFiq9c+GyVqdLY4t9bY3zza5XbTuFxJ5N2VPA:7Ciq9cfdLYm9baoVPA

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\prebuild.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\prebuild.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\prebuild.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    58dabd2398d05c3fb5b4d851714eb73e

    SHA1

    bab96025089129309ac04a6f3d15c43fbc05339f

    SHA256

    f8e078df954fb084fb81bd41c21f9a10468528a66ce10074d0a7674d8c12c36c

    SHA512

    37afa42455bbac08e07a6d23a6cca77eb35eea961f15fd4c562366be2d7d89f4648d44d35e01d39a3332d8bfff658d871337172bb9524084a271c243d11bfff9