Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 17:36
Static task
static1
collection credential_access defense_evasion discovery execution persistence privilege_escalaiton spyware stealer upxblankgrabber
2 signatures
Behavioral task
behavioral1
Sample
xniggerskid.pyc
Resource
win7-20240729-en
windows7-x64
3 signatures
1 seconds
Behavioral task
behavioral2
Sample
xniggerskid.pyc
Resource
win10v2004-20241007-en
windows10-2004-x64
2 signatures
1 seconds
General
-
Target
xniggerskid.pyc
-
Size
261B
-
MD5
371d4046d4bd46868ab5ee23240c0f0a
-
SHA1
9ceb66f0a06950191a356fc2a68c8b6791a51345
-
SHA256
d8c58206d4556c9c7b3fe262ab5e9b08fd9a4644e80b30f1cfbc85b4b0c331aa
-
SHA512
f2c4091e50e19c74ef8ee038d9b1212ff38a0f55eaabfc19de5e8fb12611b5ef49cbf7a0fbb2b51507cd15e1cd61288d5d921ba667a499549ebde5d4c94e37b8
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2824 2548 cmd.exe 30 PID 2548 wrote to memory of 2824 2548 cmd.exe 30 PID 2548 wrote to memory of 2824 2548 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc2⤵
- Modifies registry class
PID:2824
-