Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 17:28
Static task
static1
collection credential_access defense_evasion discovery execution persistence privilege_escalaiton spyware stealer upxblankgrabber
2 signatures
Behavioral task
behavioral1
Sample
xniggerskid.pyc
Resource
win7-20241010-en
windows7-x64
3 signatures
1 seconds
Behavioral task
behavioral2
Sample
xniggerskid.pyc
Resource
win10v2004-20241007-en
windows10-2004-x64
1 signatures
1 seconds
General
-
Target
xniggerskid.pyc
-
Size
123B
-
MD5
76744a0ea87fe0137c85cce8c153eb82
-
SHA1
69eed48fe829b2a22357e5b5990520a9a1277ae1
-
SHA256
9dda8ce808c22b6eefdda77170dc2b7d2bb337b8d80adebe316591f5d0fcb231
-
SHA512
d27df27f2d757588bedd54b54c3f5865dc472ddae22b8e2a39f11084e511577049b1ea4ff8aaa0e3e42fc4e7fa6cfdd25db58ade5e95f343556b8822c323a8b6
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1796 2292 cmd.exe 32 PID 2292 wrote to memory of 1796 2292 cmd.exe 32 PID 2292 wrote to memory of 1796 2292 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc2⤵
- Modifies registry class
PID:1796
-