Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 22:39

General

  • Target

    source_prepared.pyc

  • Size

    173KB

  • MD5

    b2d4c6f8a454fbb3d5d56695e02dc0b0

  • SHA1

    6471d3419be76e7748e7a562effad43627804cc5

  • SHA256

    66a2ac17a55f2b031b52f79b6f9ed5599a4bc5cabe04fda522ed072be12f554d

  • SHA512

    b489f2c3f3c2f0637d426d60fbc5eaa81d3be09401d01a1564c4dcde159cb8d93e5a4d92a76587b707be90fee51c16695f768725a5ae9f59bc8d4c9fee5e4af9

  • SSDEEP

    3072:ydHb+sxMhZz2bHdlfYSPpoI7iDbqWxQKhQpHQhJYvsicM:yxFx2ZAd1powQL61UCsA

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    3a88a79f7bd15d3227f5bce13cbfcde3

    SHA1

    59f2c29b83d3887268fd22572c540dcdb41ea948

    SHA256

    a615bf2da5968281614abe739205af236b3389672a5c389e7bc7f44988d363b1

    SHA512

    3250b0892be0a1ca26e0d8c1a1b2f8fa06470602e295806c0800a7963f6fc500d523863d57af4e896ca323a715538e49823ab0f444c58f23a6e485339ced9dcb