Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 17:41
Static task
static1
collection credential_access defense_evasion discovery execution persistence privilege_escalaiton spyware stealer upxblankgrabber
2 signatures
Behavioral task
behavioral1
Sample
xniggerskid.pyc
Resource
win7-20240903-en
windows7-x64
3 signatures
1 seconds
Behavioral task
behavioral2
Sample
xniggerskid.pyc
Resource
win10v2004-20241007-en
windows10-2004-x64
1 signatures
1 seconds
General
-
Target
xniggerskid.pyc
-
Size
261B
-
MD5
48fa8be9992a4b733319d34be0f6e32c
-
SHA1
70ce7c6e68b0803eb4a2e2ab572ef3aa67b6b78f
-
SHA256
3f99e67a91458427e5c6e67b683e6ca5a26b84b58d1d1482716780ba6ebbc74f
-
SHA512
af1b13363ef84074312618296df211c9472d14b34e0551ea7b8648034dc2e65e43e11998034c0f3835d8d73a899ea703a8f094e6403af6215bcf7dafd2c9ce25
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 924 1236 cmd.exe 32 PID 1236 wrote to memory of 924 1236 cmd.exe 32 PID 1236 wrote to memory of 924 1236 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc2⤵
- Modifies registry class
PID:924
-