Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 20:02
Behavioral task
behavioral1
Sample
synthize.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
synthize.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240802-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
c58db1b2e2c6e1422105aca6861d0baf
-
SHA1
061c01e87da7471b18dc0f8f7ac0e6f7db9efb8e
-
SHA256
d5fb56c40678966ba74a77f9f99023f3d4199d3b8f503c94bac600d784678ca2
-
SHA512
d4f789892740c6166c65864a60b6c534f8fa2a907be3b6f60bf62092df2ce1795dd009e1de89fde545f26318b55dfaffa37819efd606624edac869fd4c0da106
-
SSDEEP
192:wGxs5q/6D8qxXbWdXwvCGeofdz0kqnqJhwCCZLMdw5nw:Z4bWuXeofdwTO2CCZLP5w
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2600 AcroRd32.exe 2600 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2676 2696 cmd.exe 31 PID 2696 wrote to memory of 2676 2696 cmd.exe 31 PID 2696 wrote to memory of 2676 2696 cmd.exe 31 PID 2676 wrote to memory of 2600 2676 rundll32.exe 32 PID 2676 wrote to memory of 2600 2676 rundll32.exe 32 PID 2676 wrote to memory of 2600 2676 rundll32.exe 32 PID 2676 wrote to memory of 2600 2676 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55778c9dc2a8b630d1b89f30f4ea45f55
SHA1c274ec560c59f29cd6158adc21f4f3d9eacccbb6
SHA256a901c1e39e75658c33adf8b697f6ad49659418d288ac965af5e6d1e04fe140fc
SHA51244b0723a6163460341bb05390f5caff22f121d2a635b487bf197e68a95ee18b1c19a4b9c23f35868e0dbd93b3715522989a89657c18e74e3315831e2fc322605