Resubmissions
10/09/2024, 14:18
240910-rmqlgayflc 10Analysis
-
max time kernel
25s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/09/2024, 14:18
Behavioral task
behavioral1
Sample
Hollow.nova7.4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Hollow.nova7.4.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240802-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
0009fff420b6a8c3491c4a5e86aedb14
-
SHA1
930c1697b367bc1255af660e6c4d8c55997bc474
-
SHA256
e9cfb73d310e54180b8267f2ef656428d093ca7bc78a782a42a7d4e37ac69e7f
-
SHA512
0dc848b794e0e2aba732792b02ff7e6150dadd09721500649908bf6721de54650514aca9f41b56bbcc248f4f5fb2fedb8706b8baab767f3cee29b492394ea30b
-
SSDEEP
192:w5RC50XP28D89qVtaZWdXwa1fb6qU+VWXEJhwmQhfNFTMdwu+Anw:N0XPsKSWusfGqYY27NFTPuHw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\pyc_auto_file\ rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2672 AcroRd32.exe 2672 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2788 2720 cmd.exe 30 PID 2720 wrote to memory of 2788 2720 cmd.exe 30 PID 2720 wrote to memory of 2788 2720 cmd.exe 30 PID 2788 wrote to memory of 2672 2788 rundll32.exe 31 PID 2788 wrote to memory of 2672 2788 rundll32.exe 31 PID 2788 wrote to memory of 2672 2788 rundll32.exe 31 PID 2788 wrote to memory of 2672 2788 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5494c95a23b75b4341077ea96ac0b33f0
SHA1ee3bc142dc88057043ec35c5a49d3b6425011622
SHA25655105f50989b583ba80fb8fc225659f630dcd18ef377c46e1f2c7a385be4c245
SHA512b7cefcab8816b029bc9f26b82840aa1f204c67f43e0bfa04b9496350976530ea73663e711b9a5f8bdf16d02e83d19c0cbae8953ea10741667a7258e4f56aef30