Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 01:19
Behavioral task
behavioral1
Sample
3cfb5e4c47015ffff48609e8400770850a61d53e59259cba2a0b1c36a88c9aab.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3cfb5e4c47015ffff48609e8400770850a61d53e59259cba2a0b1c36a88c9aab.py
Resource
win10v2004-20240802-en
General
-
Target
3cfb5e4c47015ffff48609e8400770850a61d53e59259cba2a0b1c36a88c9aab.py
-
Size
20KB
-
MD5
0c472b2e6618aca50cb2dff20cd51562
-
SHA1
df5a0d16ee26aa97087c9d1cd28e08632bcd6000
-
SHA256
3cfb5e4c47015ffff48609e8400770850a61d53e59259cba2a0b1c36a88c9aab
-
SHA512
17ac9ba0eb34fb86bdc2cec890f54b0a802b8535c05bfa8479e69a63c352eba51b9df04eb66b03a431921de7bde368d5a7a2edb6217b7b2871f4cdc1a114a1dc
-
SSDEEP
384:GRExTcSVqPb61rNykWy/k74Fft1froMzZOguu:NxTcSVqPb6N/7oIeu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2708 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2708 AcroRd32.exe 2708 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2132 wrote to memory of 2752 2132 cmd.exe rundll32.exe PID 2132 wrote to memory of 2752 2132 cmd.exe rundll32.exe PID 2132 wrote to memory of 2752 2132 cmd.exe rundll32.exe PID 2752 wrote to memory of 2708 2752 rundll32.exe AcroRd32.exe PID 2752 wrote to memory of 2708 2752 rundll32.exe AcroRd32.exe PID 2752 wrote to memory of 2708 2752 rundll32.exe AcroRd32.exe PID 2752 wrote to memory of 2708 2752 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\3cfb5e4c47015ffff48609e8400770850a61d53e59259cba2a0b1c36a88c9aab.py1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\3cfb5e4c47015ffff48609e8400770850a61d53e59259cba2a0b1c36a88c9aab.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3cfb5e4c47015ffff48609e8400770850a61d53e59259cba2a0b1c36a88c9aab.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57329fb5e08a56396790505f0a60bbb9e
SHA180df0712efb49a1badda53e78fc3db61d8cf16a6
SHA2561c516800366b2e45dde83daa6b30ce4b8401a8070cc2dd780b12fddaf6d9fb29
SHA512f125fb64018ef6ce5bdbeb718f87bf1065814d284338a615fea90d49194d6d1f27cf8949e1a008cb9832c8c84af25f033019d655835844a9e611e657b1e32ad0