Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 17:37
Static task
static1
collection credential_access defense_evasion discovery execution persistence privilege_escalaiton spyware stealer upxblankgrabber
2 signatures
Behavioral task
behavioral1
Sample
xniggerskid.pyc
Resource
win7-20240708-en
windows7-x64
3 signatures
1 seconds
Behavioral task
behavioral2
Sample
xniggerskid.pyc
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
1 seconds
General
-
Target
xniggerskid.pyc
-
Size
123B
-
MD5
2ffdba67e815297c49e4b9b095b6de7d
-
SHA1
706b14ea8c8fcd5669f65aa4f7acfcedc65c72ff
-
SHA256
a64cfffaad6f9c784e2ecafcffdb6b2c0bfc2e771dff65d5c272c709a03c7151
-
SHA512
f4c88962b1eddee21e6a9270a0c1a8d9294ea8350bd4fbb7da1e321abd572f554a7f641f81f7dd829c0acc6cec56648d01be64888a97d86080972443707399e6
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 3068 2252 cmd.exe 31 PID 2252 wrote to memory of 3068 2252 cmd.exe 31 PID 2252 wrote to memory of 3068 2252 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc2⤵
- Modifies registry class
PID:3068
-