Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 19:15
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20241007-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
34344dbdef6d844760a694b6f489037a
-
SHA1
080d24d9279c573ac500557db3c6aff0bcd27009
-
SHA256
e6d38738b084062c02f871e10813f480b589d58165f549db7060f988c24612bb
-
SHA512
4f3e787bf3af87aa2944518ccc8ad15854f4de52f839d21a11c56fd24bbf5eadc44f0af915c77c7aa315b974b687d66d3b71ae076620354f13972a5878ab57ae
-
SSDEEP
192:wU+CD8pPzWdXwHeTWzPewfuXJhwz5Mdw7Jnw:v+BWu+TKmZ2z5P7Jw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2760 AcroRd32.exe 2760 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2400 2072 cmd.exe 32 PID 2072 wrote to memory of 2400 2072 cmd.exe 32 PID 2072 wrote to memory of 2400 2072 cmd.exe 32 PID 2400 wrote to memory of 2760 2400 rundll32.exe 33 PID 2400 wrote to memory of 2760 2400 rundll32.exe 33 PID 2400 wrote to memory of 2760 2400 rundll32.exe 33 PID 2400 wrote to memory of 2760 2400 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f39a605565e325aa8a5606f0014ea7e7
SHA10728e99bfd57e5c9a8407988c416bee4f24b59ec
SHA25649d5a878bfcee02f51ca299d0c67ae6f35f21f6d1afb5173aa05e96bce4ced98
SHA5121b03554453026a2b7071bc1aa63d7bea5533222887e3deb602f0ca2fc0f4a5660b89ae5db73ceed19c4bea65ea39deeedc0ecff71363f1001d55727ae448cc0a