Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 10:04
Behavioral task
behavioral1
Sample
Exias discord message del mk4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Exias discord message del mk4.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Exias discord message del mk4.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Exias discord message del mk4.pyc
Resource
win10v2004-20240802-en
General
-
Target
Exias discord message del mk4.pyc
-
Size
10KB
-
MD5
6f31c9649bd9fecf001f3791da8b1d11
-
SHA1
5b14b1f5e78a190967b37dbb88184d39816e8e46
-
SHA256
6daef2ed51fc4e881cbdf1f4d3d93c7015e876f4cc85a0e4505c20e3b26fc67c
-
SHA512
c48e51b42bd5918d20a0a0b2107e804dee40f8a7517cba95d6a0e44f7f73564de3d03ac535fe738ae0bd02691ce5c7ecffa7235237f794851e0b7150542007db
-
SSDEEP
192:QnGBpafw6OO7huJcOXrQQ+5NSpHBuM0wLV6:zBCvOO7Uzr05KHBldJ6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.pyc rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2516 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2516 AcroRd32.exe 2516 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1836 2548 cmd.exe 31 PID 2548 wrote to memory of 1836 2548 cmd.exe 31 PID 2548 wrote to memory of 1836 2548 cmd.exe 31 PID 1836 wrote to memory of 2516 1836 rundll32.exe 32 PID 1836 wrote to memory of 2516 1836 rundll32.exe 32 PID 1836 wrote to memory of 2516 1836 rundll32.exe 32 PID 1836 wrote to memory of 2516 1836 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Exias discord message del mk4.pyc"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Exias discord message del mk4.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Exias discord message del mk4.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50611341dc239922ca622d1ec9dda5300
SHA1bf086cb835d728bd3117e563ceca0f1d9a13efbf
SHA256ea06a9e65accdccf3111110115f7a49db8f56a2be1cdf3bff9816adbf1af6f62
SHA512973f0b6805eb9caa4029a0076af659456c36543aa2c117a9ea5cb515b1618f276e7a852f7ddc82ce7acf0dc1a2019455e6d691e42e39603f383159992faab66d