Analysis
-
max time kernel
18s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 13:47
Behavioral task
behavioral1
Sample
Vendcord Installer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Vendcord Installer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240802-en
General
-
Target
Stub.pyc
-
Size
875KB
-
MD5
b1e510007e1d8c3b6bde955772351527
-
SHA1
cc51c924b769617d607086dcdb9eba37d456f221
-
SHA256
58ee6da551c89c3057c3560ba62f7e2ef6be9d7d6263cfd38383268b14c28540
-
SHA512
1b5afa51939d6a988cb72f10c7cfa5c757f9c73c288e00e9bee96b961febded54305e23b595722f9686752aed7c50ba99f4c47cbc32b9e9c59e2c9366b206e4d
-
SSDEEP
12288:fFJo16J8gTpSi5Lr1fBeO9DE/e3bB7GxnrDK4mEqQDvFo4kgf1ah:f3o16sUfBB9DE/oBEnvKR5YNXUh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2796 AcroRd32.exe 2796 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1844 2368 cmd.exe 31 PID 2368 wrote to memory of 1844 2368 cmd.exe 31 PID 2368 wrote to memory of 1844 2368 cmd.exe 31 PID 1844 wrote to memory of 2796 1844 rundll32.exe 33 PID 1844 wrote to memory of 2796 1844 rundll32.exe 33 PID 1844 wrote to memory of 2796 1844 rundll32.exe 33 PID 1844 wrote to memory of 2796 1844 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD572838ac1723abd2342d1deffabfb1e35
SHA1a48eeb31b4e04b2ce2ed3e399b6fe880682289fe
SHA2566f558a7eab536a2cdb75271db32ca902582cf0850221c86b18d41bbbba9b466b
SHA512d75a91dd589b1173152bf4e48424cb4e9631642867879a63df35723d6a5ab4aa725bc51e59f1a535b0bd562ce6430b8940653161bade95a343af25e641c56410