Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 10:52
Behavioral task
behavioral1
Sample
Boostrapper.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Boostrapper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240802-en
General
-
Target
Stub.pyc
-
Size
799KB
-
MD5
082e64aa43f8e5f566b5214137cb182e
-
SHA1
71e94940cc6e4f6bb6f669ce3a0beb61a551db74
-
SHA256
dadc085c053fa61ea711a224b2a0addc89148d06563a863c10ef9b7c3e44502b
-
SHA512
fceef2620844e3bca008501d846340178b2711897e07b7032669694f47fa4a822163d964daa211822a1564dbbac79d05e4d55b4de3361d370e8b512447c99e0b
-
SSDEEP
12288:SCsbdR7HYMM1O0DWcxKCPmCcq99+bHm3i8Uv8s6sR8VOLsBWXszYr9Yw:dMBNMQ0dTmYTILyVOLsBW2o
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 AcroRd32.exe 2728 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 776 wrote to memory of 2804 776 cmd.exe 31 PID 776 wrote to memory of 2804 776 cmd.exe 31 PID 776 wrote to memory of 2804 776 cmd.exe 31 PID 2804 wrote to memory of 2728 2804 rundll32.exe 33 PID 2804 wrote to memory of 2728 2804 rundll32.exe 33 PID 2804 wrote to memory of 2728 2804 rundll32.exe 33 PID 2804 wrote to memory of 2728 2804 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5404d8b5b8302c25aa3d479dda3be8e56
SHA1c3de203500f5e5de0fa8ea325d8242fb3ebef2d6
SHA256f2a906bfb2028624a24900f96e98df9a8eec2d3c65f4e2a9344abc753343a48d
SHA512f3ddc8a6a8a79b8ede07caa2072ff9252e3065650a237ed48157f87d28466b92fe920eb97ec2ff90a8f09ab9cd98952d298d2b03231cff343a2f0a64d621040e