Resubmissions

14/09/2024, 13:50

240914-q5g7daxanm 8

14/09/2024, 13:46

240914-q3gstsxdlb 3

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 13:46

General

  • Target

    Password grabber.py

  • Size

    4KB

  • MD5

    5eef22d7688aaa2a19ea5fc7f22a6fbf

  • SHA1

    c270d11f689c9b162cfdd30785192f1283c7c5de

  • SHA256

    919e40da093adcdef91793ecb7cd681de86acd1743097052c0f092a5ccba15b8

  • SHA512

    c08b75b61465137c226ab6c4d35098c7ab942b37fdd72bcc248b4411def7bf4a17b3ee115f872c0c289725fda7e6728accc6e765ea94bef896f5c48c30e3509e

  • SSDEEP

    96:EKaGMAb4FuodXu7lOHXA82oY73vb0yT0BzdfNNoFAENFSHGSW6ySbRQhN4+KiVP8:vb4FuoZwaX2rTRcZVNoF/qHY6ySb4a+y

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Password grabber.py"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Password grabber.py
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads