Analysis
-
max time kernel
7s -
max time network
10s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
cstealer.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cstealer.py
Resource
win10v2004-20240802-en
General
-
Target
cstealer.py
-
Size
55KB
-
MD5
ea43e227bb696283c4f8264bddf812c9
-
SHA1
79ac2cbb09ca0171d52c1e354bdbc9f95b7c52a6
-
SHA256
cc908724a3f6d6b06f3a270c4fbb8d0a3d338d70b6d4c8c79f4d9b3e3ee959dc
-
SHA512
59b7c24f1cf807d5377f02f117961e33136e0c381181043685445d9c81dec31d3c0ec4fe5af9ad02c74b90a8e80fa75ffe9794813d4e49e91e3e1845aca8c3f4
-
SSDEEP
1536:dTjwFKWAs8SMApj48b9tTLCKDJ3bN1GTI6+B:djswKj48b9lLvJ33GTY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\py_auto_file\shell rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 AcroRd32.exe 2868 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 908 wrote to memory of 2496 908 cmd.exe 31 PID 908 wrote to memory of 2496 908 cmd.exe 31 PID 908 wrote to memory of 2496 908 cmd.exe 31 PID 2496 wrote to memory of 2868 2496 rundll32.exe 32 PID 2496 wrote to memory of 2868 2496 rundll32.exe 32 PID 2496 wrote to memory of 2868 2496 rundll32.exe 32 PID 2496 wrote to memory of 2868 2496 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\cstealer.py1⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\cstealer.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\cstealer.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2868
-
-