Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:53

General

  • Target

    TheBigTool-main/Settings/Program/Config/__pycache__/Config.cpython-312.pyc

  • Size

    502B

  • MD5

    d0096f9afc958debaf8e147c584438ed

  • SHA1

    2c27c8a614bb7a1a01b6048ac32423275ef1658f

  • SHA256

    4019dec348ebf6a45ef4ffcdfacf26782c3b414a684d4ce483f579351b5dff9f

  • SHA512

    da60cfd51f02631648a8f31ca597dad2b5c386e03b8615b0afc7018d98d7a5c6a5890193addf0e7edadf0caf0c4036969033be35f81832c48495a32e6f862aca

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\TheBigTool-main\Settings\Program\Config\__pycache__\Config.cpython-312.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TheBigTool-main\Settings\Program\Config\__pycache__\Config.cpython-312.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TheBigTool-main\Settings\Program\Config\__pycache__\Config.cpython-312.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    28425a4e4ae16ce52a0535037b7d4fa4

    SHA1

    78bb5c6b95823d28a65a9efb4b3670d59fa64fcb

    SHA256

    8a4cf072d63ac5647b7b2ec45235f1d19a212c8734a88e07cc58787b1a1e4a32

    SHA512

    563c1fd14e63456bb21115849cfde1611b1c937dda3b6f41acde68c600d32706b6da612c6ac5cb5c991108f67d59c90d69ba1e7cc81e2842f271b06000fff245