Analysis

  • max time kernel
    1561s
  • max time network
    1576s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2024 18:51

General

  • Target

    IDA/python/examples/uihooks/lines_rendering.py

  • Size

    4KB

  • MD5

    eb9baf197b1086daa5b36909d9db6f4d

  • SHA1

    22527207dcdffa6b50a3ae8b10aed333964676b7

  • SHA256

    a93f09fb2e904e3ae630cad4faaebfc234da35ed350a613989851654e39ad9b5

  • SHA512

    30c230a19d82a9e3129593a6a6f18ea86ebc145c790fc1506579412b02157720d062f0368812e5209da93fa3ed736c751977eaa2c73e789ab83adf35e6195809

  • SSDEEP

    48:tbNMI4PW8cLZdT2w5KCyveavQllWvmHUEMR29CQKHaw9wck:tbNM5WB1X1l5fHw9fk

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\IDA\python\examples\uihooks\lines_rendering.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\IDA\python\examples\uihooks\lines_rendering.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\IDA\python\examples\uihooks\lines_rendering.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    9f1161f2ce1a7beca9efe514af8a12b1

    SHA1

    6734215bc4df581e76821ee548dbd22e4aba168c

    SHA256

    cfa19baff4f4ea5b7a2f729b0c7e23a84c24387b19735601321125393a6bcb73

    SHA512

    2a9add70e7be9fc830adb4cf7218d832d6d60dde2a3dae09462b3f9a9c5602ce8485932b47280650153e410555dc138fe6a8514597d732f4ab8485365cb38f62