Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 17:35
Static task
static1
collection credential_access defense_evasion discovery execution persistence privilege_escalaiton spyware stealer upxblankgrabber
2 signatures
Behavioral task
behavioral1
Sample
xniggerskid.pyc
Resource
win7-20240708-en
windows7-x64
3 signatures
1 seconds
Behavioral task
behavioral2
Sample
xniggerskid.pyc
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
1 seconds
General
-
Target
xniggerskid.pyc
-
Size
261B
-
MD5
45e59039782a81c6dbd5bd3f69bf966f
-
SHA1
c8ff4990c6dba01787e35d78e0eaf0bffa8e3b34
-
SHA256
727fb8e70b36f7e212926e26495963f6d66ec04b76898ac8acb3930e8bef24b2
-
SHA512
b04e9ba623eb455d15e0a2fd662855c95f7b5e82e88cd9218117085fb6d903280c36dc666177f3025bfbd48f82b161d5cce92d53c0f0cc777e54069161d776cd
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2236 1452 cmd.exe 31 PID 1452 wrote to memory of 2236 1452 cmd.exe 31 PID 1452 wrote to memory of 2236 1452 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc2⤵
- Modifies registry class
PID:2236
-