Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:16

General

  • Target

    Update.py

  • Size

    17KB

  • MD5

    0351b38d536c00a750d03b7f82021e57

  • SHA1

    24a0a1c199f2ff7d7483865463a240ec8576956c

  • SHA256

    913305bff95b672e842ddde3b364e07acc148033ba95e80f4ce257105a6b024d

  • SHA512

    550d10761d7a686d3fdbcba6c70ef40384e01c10e031b89ba99ee4a1646e88dfd38f29733f18e7fe5e2021bdcf3832e811e5190d39382b1f8602f58ca8045ae7

  • SSDEEP

    384:I+MTotDsU9OqO55qzStVUK8YqCiUn01kRSkrMGZ8U/rDy1POQi6UUKy4NMDqlbHg:IRrkO55qGtVptTi8rTiqrkOQi6x4NMDl

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Update.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Update.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Update.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f3f31f610820e3cbb7b711f1b80d147b

    SHA1

    9abbc6056361c1c593856a53c2c6ab15eb9972ed

    SHA256

    75db430b34ec9dadade2e658305ef3b492aab0b8b95bd3d533cfc0ce96089f39

    SHA512

    530f1cb88c4e0257f3010ffcff695b93c558cf3a786b5cb19408cf0c6703be7380b30ed721789a73baee2229c18c5f24f3d6e68883de1d29d01d071465a0932e