Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 06:08
Behavioral task
behavioral1
Sample
sim.py
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
sim.py
Resource
win10v2004-20240802-en
General
-
Target
sim.py
-
Size
20KB
-
MD5
0c472b2e6618aca50cb2dff20cd51562
-
SHA1
df5a0d16ee26aa97087c9d1cd28e08632bcd6000
-
SHA256
3cfb5e4c47015ffff48609e8400770850a61d53e59259cba2a0b1c36a88c9aab
-
SHA512
17ac9ba0eb34fb86bdc2cec890f54b0a802b8535c05bfa8479e69a63c352eba51b9df04eb66b03a431921de7bde368d5a7a2edb6217b7b2871f4cdc1a114a1dc
-
SSDEEP
384:GRExTcSVqPb61rNykWy/k74Fft1froMzZOguu:NxTcSVqPb6N/7oIeu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2756 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2756 AcroRd32.exe 2756 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2144 wrote to memory of 2340 2144 cmd.exe rundll32.exe PID 2144 wrote to memory of 2340 2144 cmd.exe rundll32.exe PID 2144 wrote to memory of 2340 2144 cmd.exe rundll32.exe PID 2340 wrote to memory of 2756 2340 rundll32.exe AcroRd32.exe PID 2340 wrote to memory of 2756 2340 rundll32.exe AcroRd32.exe PID 2340 wrote to memory of 2756 2340 rundll32.exe AcroRd32.exe PID 2340 wrote to memory of 2756 2340 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sim.py1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sim.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sim.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f61f2940474a5b1875e97b7e0ae223b5
SHA1a26724e59cbf4beaf5cb7874fa8f03901a734371
SHA256f7aa7a472e52b4f7814814c108d3552be918528b4765512335fcb925da0e466c
SHA51267260dcae15ec44c31ebd394d9c438c3ca3e822fd56fd7ec53a3b427df257d304de9d65e9b781e290e475573253513a90ca198a78f5ca66d72bdb9144dd2c1f0