Analysis
-
max time kernel
8s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
client.py
Resource
win7-20240903-en
windows7-x64
4 signatures
300 seconds
Behavioral task
behavioral2
Sample
client.py
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
300 seconds
General
-
Target
client.py
-
Size
877B
-
MD5
52e18f526908a26438878f7c548227f8
-
SHA1
3ddd1c3d59186e782831af64839f15475f2119a8
-
SHA256
b08381d44187d77c5ac7d672b67b128172526733d0f19003f683f2a6af97e534
-
SHA512
c81713d84a5a1ed4add504a3bec311261a3806d1e29e8058e9e7b908aeefb767dcd5988e81842099049bc0f5c6acf63ddad583fdb3c6aa399efdd391de019e98
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2252 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2252 2548 cmd.exe 31 PID 2548 wrote to memory of 2252 2548 cmd.exe 31 PID 2548 wrote to memory of 2252 2548 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\client.py1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\client.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2252
-