Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 15:24
Behavioral task
behavioral1
Sample
sim (6).py
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
sim (6).py
Resource
win10v2004-20241007-en
General
-
Target
sim (6).py
-
Size
3.8MB
-
MD5
72aa6d47b8ed1750400471b94270abc5
-
SHA1
17f45e30b517b1d652accb500ba97eed8e6157da
-
SHA256
6fd1666dbb03fbdf22bd1c69e5accfba40429fc5fe4a53af4d1c708da4c29f09
-
SHA512
7d7119c900585c035ca10e79c7cf69fc1eb2d33ae5a58e6a11a31b334404666895c422f74d4d5f443a5153785dc8a6e971e37f96128cac2d5a4e06063bc4e2e0
-
SSDEEP
384:KRExTcSVqPb61rNykWy/k74Fft1froMzZauF:RxTcSVqPb6N/7oIzF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2720 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2720 AcroRd32.exe 2720 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2444 wrote to memory of 2740 2444 cmd.exe rundll32.exe PID 2444 wrote to memory of 2740 2444 cmd.exe rundll32.exe PID 2444 wrote to memory of 2740 2444 cmd.exe rundll32.exe PID 2740 wrote to memory of 2720 2740 rundll32.exe AcroRd32.exe PID 2740 wrote to memory of 2720 2740 rundll32.exe AcroRd32.exe PID 2740 wrote to memory of 2720 2740 rundll32.exe AcroRd32.exe PID 2740 wrote to memory of 2720 2740 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\sim (6).py"1⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\sim (6).py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sim (6).py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5629dc2de062bdd7c2528725c6b8c01f8
SHA1251c3e47123462245f037823d68e51988e7846b7
SHA2564f0e75cbf88ba1b8af3d3f968ce5df4d57b4ddddbcda7c972321e41c1547aaf9
SHA5120d88e5b747b6bfbda7fc9aec10a4714b11cf076085c010293fef667dedf5300db6aea38535d9dbc396dd172ed8875d84c41193e20ccf045c954635bbc5b7debe