Analysis
-
max time kernel
102s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 20:56
Behavioral task
behavioral1
Sample
OTPBOT.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
OTPBOT.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
otpbotlocal.pyc
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
otpbotlocal.pyc
Resource
win10v2004-20240802-en
General
-
Target
otpbotlocal.pyc
-
Size
9KB
-
MD5
2f2229f1c983738ed7e15cbe61e08c13
-
SHA1
99e6852bf1ec3b14b1165d3cab80e99e4b94c09f
-
SHA256
45820bb814081367987b110b3f1f3f10cd74ea028dfc9fca6ce5c93d80a8e9eb
-
SHA512
981c56c910c533163de5b0fcca0278fdea20f17a17d95745b0ac9e8bd1b81c6649a08735821d953f58da0537975c0e6fdcb32777af5b63f85ec198aff97c567d
-
SSDEEP
192:lQZxZmNYXiPJkDUn77777B77bTuC7Ic3sevCxJhtNWrmhoFDW:lQZKuyVyC13sIHrmhoFDW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2184 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2184 AcroRd32.exe 2184 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2912 2748 cmd.exe 31 PID 2748 wrote to memory of 2912 2748 cmd.exe 31 PID 2748 wrote to memory of 2912 2748 cmd.exe 31 PID 2912 wrote to memory of 2184 2912 rundll32.exe 32 PID 2912 wrote to memory of 2184 2912 rundll32.exe 32 PID 2912 wrote to memory of 2184 2912 rundll32.exe 32 PID 2912 wrote to memory of 2184 2912 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\otpbotlocal.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\otpbotlocal.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\otpbotlocal.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f6da8a79608dda5f628461a54f3eb815
SHA13f81706b744ee351fab89bdb1a610f009136d0be
SHA256e89706a1ec454cf0e178190056da88aa038825f0541174165c6dfbda81ddd783
SHA512911b46c6d4dbdbab1952f2db835d29580fa2e05ab3417ea7bbb6ea157c5a8215814b0f7d8c1d728eae7203edaf8863c9823edb101decbc504093dbe07183ee06