Analysis
-
max time kernel
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 19:51
Static task
static1
pyinstalleradware antivm apt upx backdoor banker bootkit botnet clipper collection crypter discovery downloader dropper evasion exploit exploiterdoomrat
4 signatures
Behavioral task
behavioral1
Sample
dontrun.pyc
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
dontrun.pyc
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
dontrun.pyc
-
Size
5KB
-
MD5
24c2e8936131086ab895bb2f6227b551
-
SHA1
069cee188ba1d3bdf8b4cc0e4823a5ccd953ee69
-
SHA256
efa2288d18bf399e8cd5b8e83dd76e74a72a3877472b573046efcd034bcf0782
-
SHA512
856bbf30a9edb2e064a487df61553d76a4fd1a80402d374588f0a2317bfb6c420a6bace126da67a247875b6de7007f0107e99a721faffe7a68e569872db01fc0
-
SSDEEP
96:oaqeVrBmylZDR2eK6zvlgpVSSUKBccccc3cchF/NI40a5sZwaWhTB0Ia1:a+Zd2eK6lgp5vccccc3cchFiamCtB0x1
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1984 wrote to memory of 3064 1984 cmd.exe 31 PID 1984 wrote to memory of 3064 1984 cmd.exe 31 PID 1984 wrote to memory of 3064 1984 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\dontrun.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\dontrun.pyc2⤵
- Modifies registry class
PID:3064
-