Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:42
Behavioral task
behavioral1
Sample
Soda.v1.4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Soda.v1.4.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240802-en
General
-
Target
main.pyc
-
Size
33KB
-
MD5
351ea8927596fbb03815cb74d54c61ae
-
SHA1
1982ebce7a7d4724dfb3104e1ad57a8b0205288f
-
SHA256
cabaf14c77189177991f122f49453c6efda5ae57a6da29d0091ce3ec1eb950b1
-
SHA512
812eb69394a104fcdaed69323c0f033fb0f88f537182645a4bf372cde45da40cf497ec067227e03b98700708ff946f53e06f0d39a89eeff5fc07cf96025c0352
-
SSDEEP
768:9cKVRW6kRpW6PYTPlXJcOlPO4VOSF5Wu2tEExc:REBvPA/bpD0EZ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2492 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2492 AcroRd32.exe 2492 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1988 2316 cmd.exe 29 PID 2316 wrote to memory of 1988 2316 cmd.exe 29 PID 2316 wrote to memory of 1988 2316 cmd.exe 29 PID 1988 wrote to memory of 2492 1988 rundll32.exe 30 PID 1988 wrote to memory of 2492 1988 rundll32.exe 30 PID 1988 wrote to memory of 2492 1988 rundll32.exe 30 PID 1988 wrote to memory of 2492 1988 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e4c3c332a23728ec85f26df39d3c87fd
SHA121b5ec82fdd4e65adad8a22d48ba0f1bc216d5fd
SHA2569b54401611c8ce8386e09b5765b5a28c47c95b99a56bc1bf69a6daf16284ed00
SHA512a50c557ec0da3b0f462623938c921321c0716bc00fb85350371259fb4482d4b3f8458e76e54ef8a764f21e1a01194aa72cd98775ca51ffa35f64c22eb4bf0275