Analysis

  • max time kernel
    120s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2024 17:37

General

  • Target

    IDA Pro 8.3.230608 (x86, x86_64)/python/examples/core/custom_cli.py

  • Size

    2KB

  • MD5

    9ad756e578ff5e3e628bd670407381e6

  • SHA1

    d65fbd82c10b9ccabf90580435b89e3515efd8f5

  • SHA256

    2f61e1f43d9bb89b225ddeadb205ef84a3a8fa4ae314527b5c6d350fddd51296

  • SHA512

    41da7a8a934860ee93ee5a763ed81830de0a688fb2e07b96650ac898befe49e51e784a0ba8d07f60d9ad754e2d2d5f366c068524f9f6dc4caeb740f6ed9d0f3f

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\IDA Pro 8.3.230608 (x86, x86_64)\python\examples\core\custom_cli.py"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\IDA Pro 8.3.230608 (x86, x86_64)\python\examples\core\custom_cli.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\IDA Pro 8.3.230608 (x86, x86_64)\python\examples\core\custom_cli.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    abc9b8daaa5a4e5b3b61c67e0966e232

    SHA1

    d86d4e9049d03b3f80b81ef1a76e3bb187f89e06

    SHA256

    c5b600738caa8095ec01babfd5d604addb3ac5b1ac27326e662945c208a60d4c

    SHA512

    39dca62e1513faa2dba614f69f45b22eb669624e6492605711360fe3c747a657b7fb81a69b0e4cd4d021f156969f0a358279585b5a8cb5fb6a6911c77c243c33