Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 13:14
Static task
static1
Behavioral task
behavioral1
Sample
Database.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Database.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Info.py
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Info.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Main_botrun.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Main_botrun.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Main.ps1
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Main.ps1
Resource
win10v2004-20241007-en
General
-
Target
Database.py
-
Size
13KB
-
MD5
4b446b8df83e29ae3875fc6628a34d26
-
SHA1
124e5a5b4c743e7df8146e8de83c8854a8a91f94
-
SHA256
af3250b1fb3599d5f6e473b0c2a688efdf53fe075bc023ad09f92a1b9eda93cf
-
SHA512
cf29308e6765ee44f945c82c56d616e67d5e54eef2f6ef8d15382d47668f1a9850593dab114a1d8fba8c27ec9913fcc43356adb2fd7d7fe6a107b64b7f066137
-
SSDEEP
192:DtCzwhZUK1lG+t5e0o2P7oAqoRZmGssG4SscvNR4ugbOhcedhyyQ:FZR7B59LTdlRZmGssGfle8Qj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2556 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2556 AcroRd32.exe 2556 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2960 2744 cmd.exe 32 PID 2744 wrote to memory of 2960 2744 cmd.exe 32 PID 2744 wrote to memory of 2960 2744 cmd.exe 32 PID 2960 wrote to memory of 2556 2960 rundll32.exe 33 PID 2960 wrote to memory of 2556 2960 rundll32.exe 33 PID 2960 wrote to memory of 2556 2960 rundll32.exe 33 PID 2960 wrote to memory of 2556 2960 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Database.py1⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Database.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Database.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51d8f9b3abb6a5105648fd54e2032ebcf
SHA11b03731e72eaf81b2afab5307144371e378fbbb3
SHA25616f2b129d34c7077c1d84f42f2fcce5be50289fe0886e6094a51098f33ecb4e4
SHA51231d945df83495a0be65760a6025f19cf6be8bea678ffe229a88d2025668fe56517e607f2be5a9cc33206c6413edc5a287b2ebf632f1111cd57cd13a960f3907d