Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 01:53
Behavioral task
behavioral1
Sample
8307b2da841d49c68a217b968c21871f55aafd77e31cd52d824bd3ed56fef2c4.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8307b2da841d49c68a217b968c21871f55aafd77e31cd52d824bd3ed56fef2c4.py
Resource
win10v2004-20241007-en
General
-
Target
8307b2da841d49c68a217b968c21871f55aafd77e31cd52d824bd3ed56fef2c4.py
-
Size
721KB
-
MD5
8edde6b35c53962975d8ab7b2b75d3be
-
SHA1
c5e0fe197c0396bf570fa334b981c8aaf22b4f8d
-
SHA256
8307b2da841d49c68a217b968c21871f55aafd77e31cd52d824bd3ed56fef2c4
-
SHA512
ef668569a51733071a4718f73cfdae9ad81165e850477a0b3c117fb9dd323e73365ae25c964a575d3cd9300dd496418f452fe621ff5ccc0f3836e2cf9d37ed2d
-
SSDEEP
384:+RExTcSVqPb61rNykWy/k74Fft1froMzZwu9:VxTcSVqPb6N/7oId9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2756 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2756 AcroRd32.exe 2756 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2900 wrote to memory of 2928 2900 cmd.exe rundll32.exe PID 2900 wrote to memory of 2928 2900 cmd.exe rundll32.exe PID 2900 wrote to memory of 2928 2900 cmd.exe rundll32.exe PID 2928 wrote to memory of 2756 2928 rundll32.exe AcroRd32.exe PID 2928 wrote to memory of 2756 2928 rundll32.exe AcroRd32.exe PID 2928 wrote to memory of 2756 2928 rundll32.exe AcroRd32.exe PID 2928 wrote to memory of 2756 2928 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\8307b2da841d49c68a217b968c21871f55aafd77e31cd52d824bd3ed56fef2c4.py1⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\8307b2da841d49c68a217b968c21871f55aafd77e31cd52d824bd3ed56fef2c4.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8307b2da841d49c68a217b968c21871f55aafd77e31cd52d824bd3ed56fef2c4.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5df4c051ce9332ac30ffcd32b5fd14623
SHA13869fbdbb7f9dc65676359b8c63bdb6d4722816c
SHA256545501f480f5f644ec221018671bcf359961b306d9e7616fe5d68a86c76bde61
SHA51279f687e32e601d67997c02b6ad2371d4d2d77544cbace9da312e0361e6bd44aec8fba07444dd4c7ac3f67f6645fd9973533184d517b3512a7cf05177534a5dda