Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 21:49
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20241007-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
2d5d03c40cd5fb0edd9100c45fc40708
-
SHA1
5b264f63af39b6b81ace8ae45746918c0ce7a810
-
SHA256
c801b0f29f43368b3b499ee3cb700f0116af3a98caa63825c236fe62c58e8b1e
-
SHA512
3e34529ddffad02ec9644b26887036eba3c69743f79b27f3073451c53e6596abc5d17eec8dd41d1a02237dafbcbb27920a3058b885651d236fc690edc925cb96
-
SSDEEP
192:wWPWEkJGY4D8qp6WdXw+8K3uNdMoFQJhw5sMdwMsnw:dSJfWu+8RNdt026PMsw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2548 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2548 AcroRd32.exe 2548 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2660 wrote to memory of 2388 2660 cmd.exe rundll32.exe PID 2660 wrote to memory of 2388 2660 cmd.exe rundll32.exe PID 2660 wrote to memory of 2388 2660 cmd.exe rundll32.exe PID 2388 wrote to memory of 2548 2388 rundll32.exe AcroRd32.exe PID 2388 wrote to memory of 2548 2388 rundll32.exe AcroRd32.exe PID 2388 wrote to memory of 2548 2388 rundll32.exe AcroRd32.exe PID 2388 wrote to memory of 2548 2388 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51581dd48ac9bd52a0b7c5b2e7f0963a4
SHA1c8a2ab21190f6e24e4651f69ce6c318aac618da3
SHA256367bc3a3a8c128eb7b765fcede3f3c4ea615778a7c08c4a13ae5b4fa9bc11892
SHA512b40e2df897a353ae2bd694db94cd00459052a450a272f285739ffa6d8b0242efbad9c9e9871669a1576bf6a8d3a7d852930c8b48bc6d1019f63da418b14a42fa