Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 17:17
Behavioral task
behavioral1
Sample
downloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
downloader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
downloader.pyc
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
downloader.pyc
Resource
win10v2004-20241007-en
General
-
Target
downloader.pyc
-
Size
32KB
-
MD5
daff18d94a9be9bd792af150ea709ef9
-
SHA1
8a917b0163235ecf7b10d34cf230e9876687ff39
-
SHA256
be68b9966df22af603e5287c167550c38c6fa03cf6de6901c1d0253ea1d887fb
-
SHA512
8eb62e33ffdf1fd90f067c70ce59474dadafa9fb1166a5eb3fb935c5c1fb8368c072c18656d5d2da3cb73a408d133424b3b9d3cdd4d5918e2cf34103beeeea50
-
SSDEEP
768:q1vGE0L6xnlX4donrRvWyowr0oQDyKbhCsu/:qNrFDfr5QdbMsu/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 3020 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 3020 AcroRd32.exe 3020 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2188 wrote to memory of 2392 2188 cmd.exe rundll32.exe PID 2188 wrote to memory of 2392 2188 cmd.exe rundll32.exe PID 2188 wrote to memory of 2392 2188 cmd.exe rundll32.exe PID 2392 wrote to memory of 3020 2392 rundll32.exe AcroRd32.exe PID 2392 wrote to memory of 3020 2392 rundll32.exe AcroRd32.exe PID 2392 wrote to memory of 3020 2392 rundll32.exe AcroRd32.exe PID 2392 wrote to memory of 3020 2392 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\downloader.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\downloader.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\downloader.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58c5ab56fb7f9ee631364fb4aeb3a1730
SHA11e7da48c8a3eb8ed8c68eca8dc693ddd38d0ca80
SHA256cc9be06ec51959e3909ad0f3baa5daae892b29348c96e95c9590968d213b4a86
SHA512cbb104f6b24544a9c6f3d055242591a94427627e5af5200b1d8055457c01c387107f396a9f5c78794c9d8e36b60932bd5fd2eebffebd1dc041d2191df07b68f2