Resubmissions
21-10-2024 17:16
241021-vs5t5a1fpp 1021-10-2024 16:10
241021-tmhxqsydqd 1021-10-2024 16:06
241021-tkatcazhrk 10Analysis
-
max time kernel
1560s -
max time network
1561s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 16:10
Behavioral task
behavioral1
Sample
Compiled.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Compiled.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20241007-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
09518663caeda063776f6737284938e1
-
SHA1
1b492e1c4880a509350c706678ea606ff6d2ece0
-
SHA256
715c625cc1b148e504cccc4b354621b9b32697eeff344247d52ef02339dfb0e6
-
SHA512
05bd58a5a7d9aa42d3643ce3e5179991634ae110eab54bc3ec68e6df346560e05802f9e46b28c5e040b7212903d9ce242606e875f27070517bcc2e5554757dda
-
SSDEEP
192:wvP7VirD8fiVYWdXwk4YSk2kJhwjyyJ6PMdw3+7nw:8PJNBWukNSX42jy7Pyw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2172 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2172 AcroRd32.exe 2172 AcroRd32.exe 2172 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2684 2644 cmd.exe 31 PID 2644 wrote to memory of 2684 2644 cmd.exe 31 PID 2644 wrote to memory of 2684 2644 cmd.exe 31 PID 2684 wrote to memory of 2172 2684 rundll32.exe 32 PID 2684 wrote to memory of 2172 2684 rundll32.exe 32 PID 2684 wrote to memory of 2172 2684 rundll32.exe 32 PID 2684 wrote to memory of 2172 2684 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51f33abba70eab642ce95d4d2f49c3bb5
SHA1fe48b1e8d4f8862152273f04f47d16081da21307
SHA2565830289a1a421edfd70cbab3856074d2fb0d014ec9cbfe380d70b62a25d6e335
SHA5127cd09592461c6644bb80daeed6b2d3b8c3cdc904a8b0dd5d58eb105aa7a8fc9041fe7c540cc28fc5c9b3c942a7ada6f16981302e3e64c58e0a18728f52708cbc