Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 22:39

General

  • Target

    get_cookies.pyc

  • Size

    9KB

  • MD5

    0504b82cde99fbefcd65b243ab38924f

  • SHA1

    1ff59e1c8fab9b0d114b3dd197716d69517180b6

  • SHA256

    e109c67ce0c720d6248062c5a7cc62d5238fa2066f5c846afc3f9749cf06d022

  • SHA512

    ef4707427e48a6590353520ce1399dc184e2974601cfaa976daf2a6ffbf37348c5672b2ceaeed887024f40475f22c29afb106a21455c90142560a84225331cfc

  • SSDEEP

    96:pCr+9UjbMMKikSnoJn8ybA6HUWcY/x2uSFQL5EChjvNlNRjpkUBvZFirppjFzuJV:srVeikp6QfUFWxPfKI11qVpj87+AiHjS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8d4a17560f8fa20872ec6b6055a971c1

    SHA1

    fe27550b7cd4b769920f9487ce11a153c50611e7

    SHA256

    480c5e70d0fe05dccd68024efaf7521a9e6c0dedf2174f06399d9b8f174b3cd5

    SHA512

    458a1958152b0e61ebcb23b807a5d888e4839243d39777fab543504b46112d693eed748b92e2e578a71a3737daa69ad7afe2b7ee7e21325cd52772bf95b00d8c