Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 11:09
Static task
static1
collection credential_access defense_evasion discovery execution persistence privilege_escalaiton spyware stealer upxblankgrabber
2 signatures
Behavioral task
behavioral1
Sample
xniggerskid.pyc
Resource
win7-20240903-en
windows7-x64
3 signatures
1 seconds
Behavioral task
behavioral2
Sample
xniggerskid.pyc
Resource
win10v2004-20241007-en
windows10-2004-x64
2 signatures
1 seconds
General
-
Target
xniggerskid.pyc
-
Size
261B
-
MD5
3dccdd09239192a7755ff3f82682d710
-
SHA1
467400097e4d5b366f06bad384bc8ae459e6a8af
-
SHA256
feb3e35583b6385c45a8e97f80e0abb7dd4e81f0ccdc7f1a9cab66fa3ff2a0db
-
SHA512
b3269600da7fb68a35d87c062d34cc43e22e60842efbed4c072c7495edba332341209ad7b0f6c5cca0388548360615c9ea0444059244429798f26044aa282795
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2432 2252 cmd.exe 32 PID 2252 wrote to memory of 2432 2252 cmd.exe 32 PID 2252 wrote to memory of 2432 2252 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\xniggerskid.pyc2⤵
- Modifies registry class
PID:2432
-