Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
Password grabber.py
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Password grabber.py
Resource
win10v2004-20240802-en
12 signatures
150 seconds
General
-
Target
Password grabber.py
-
Size
4KB
-
MD5
5eef22d7688aaa2a19ea5fc7f22a6fbf
-
SHA1
c270d11f689c9b162cfdd30785192f1283c7c5de
-
SHA256
919e40da093adcdef91793ecb7cd681de86acd1743097052c0f092a5ccba15b8
-
SHA512
c08b75b61465137c226ab6c4d35098c7ab942b37fdd72bcc248b4411def7bf4a17b3ee115f872c0c289725fda7e6728accc6e765ea94bef896f5c48c30e3509e
-
SSDEEP
96:EKaGMAb4FuodXu7lOHXA82oY73vb0yT0BzdfNNoFAENFSHGSW6ySbRQhN4+KiVP8:vb4FuoZwaX2rTRcZVNoF/qHY6ySb4a+y
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2056 2476 cmd.exe 32 PID 2476 wrote to memory of 2056 2476 cmd.exe 32 PID 2476 wrote to memory of 2056 2476 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Password grabber.py"1⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Password grabber.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2056
-