Overview
overview
10Static
static
10empyrean-m...ld.bat
windows11-21h2-x64
1empyrean-m...ain.py
windows11-21h2-x64
3empyrean-m...ild.py
windows11-21h2-x64
3empyrean-m...fig.py
windows11-21h2-x64
3empyrean-m...env.py
windows11-21h2-x64
3empyrean-m...ate.py
windows11-21h2-x64
3empyrean-m...fig.py
windows11-21h2-x64
3empyrean-m...on.bat
windows11-21h2-x64
8empyrean-m...bug.py
windows11-21h2-x64
3empyrean-m...ers.py
windows11-21h2-x64
3empyrean-m...ken.py
windows11-21h2-x64
3empyrean-m...ion.py
windows11-21h2-x64
3empyrean-m...tup.py
windows11-21h2-x64
3empyrean-m...nfo.py
windows11-21h2-x64
3empyrean-m...fig.py
windows11-21h2-x64
3empyrean-m...ain.py
windows11-21h2-x64
3Resubmissions
08-11-2024 22:42
241108-2m5qha1fph 10Analysis
-
max time kernel
214s -
max time network
210s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-11-2024 22:42
Behavioral task
behavioral1
Sample
empyrean-main/build.bat
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
empyrean-main/builder/main.py
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
empyrean-main/builder/util/build.py
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
empyrean-main/builder/util/config.py
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
empyrean-main/builder/util/makeenv.py
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
empyrean-main/builder/util/obfuscate.py
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
empyrean-main/builder/util/writeconfig.py
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
empyrean-main/install_python.bat
Resource
win11-20241023-en
Behavioral task
behavioral9
Sample
empyrean-main/src/components/antidebug.py
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
empyrean-main/src/components/browsers.py
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
empyrean-main/src/components/discordtoken.py
Resource
win11-20241023-en
Behavioral task
behavioral12
Sample
empyrean-main/src/components/injection.py
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
empyrean-main/src/components/startup.py
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
empyrean-main/src/components/systeminfo.py
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
empyrean-main/src/config.py
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
empyrean-main/src/main.py
Resource
win11-20241007-en
General
-
Target
empyrean-main/install_python.bat
-
Size
686B
-
MD5
f30718a354e7cc104ea553ce5ae2d486
-
SHA1
3876134e6b92da57a49d868013ed35b5d946f8fd
-
SHA256
94008c8135d149fecd29ca62aded487f0fbfa6af893596ffc3e4b621a0fe4966
-
SHA512
601b2256ea709a885741f1dec5c97dda6fb7fd4e485b4afac3503af1aefe73472e5bc5529c144814a3defbc0b51ac4b50e02a50dccc69b41ee5d87a3f4282874
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2672 powershell.exe -
pid Process 2672 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1472 python-installer.exe 2896 python-installer.exe 1872 python-3.10.9-amd64.exe -
Loads dropped DLL 1 IoCs
pid Process 2896 python-installer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language python-installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language python-installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language python-3.10.9-amd64.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2672 powershell.exe 2672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2672 powershell.exe Token: SeBackupPrivilege 3804 vssvc.exe Token: SeRestorePrivilege 3804 vssvc.exe Token: SeAuditPrivilege 3804 vssvc.exe Token: SeBackupPrivilege 1000 srtasks.exe Token: SeRestorePrivilege 1000 srtasks.exe Token: SeSecurityPrivilege 1000 srtasks.exe Token: SeTakeOwnershipPrivilege 1000 srtasks.exe Token: SeBackupPrivilege 1000 srtasks.exe Token: SeRestorePrivilege 1000 srtasks.exe Token: SeSecurityPrivilege 1000 srtasks.exe Token: SeTakeOwnershipPrivilege 1000 srtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2896 python-installer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1440 wrote to memory of 3456 1440 cmd.exe 80 PID 1440 wrote to memory of 3456 1440 cmd.exe 80 PID 3456 wrote to memory of 2672 3456 cmd.exe 81 PID 3456 wrote to memory of 2672 3456 cmd.exe 81 PID 1440 wrote to memory of 4616 1440 cmd.exe 83 PID 1440 wrote to memory of 4616 1440 cmd.exe 83 PID 1440 wrote to memory of 1472 1440 cmd.exe 84 PID 1440 wrote to memory of 1472 1440 cmd.exe 84 PID 1440 wrote to memory of 1472 1440 cmd.exe 84 PID 1472 wrote to memory of 2896 1472 python-installer.exe 85 PID 1472 wrote to memory of 2896 1472 python-installer.exe 85 PID 1472 wrote to memory of 2896 1472 python-installer.exe 85 PID 2896 wrote to memory of 1872 2896 python-installer.exe 86 PID 2896 wrote to memory of 1872 2896 python-installer.exe 86 PID 2896 wrote to memory of 1872 2896 python-installer.exe 86 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\empyrean-main\install_python.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"2⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest https://www.python.org/ftp/python/ -UseBasicParsing | Select-String -Pattern '3.10.[0-9]{1,2}' -AllMatches | Select-Object -ExpandProperty Matches | Select-Object -ExpandProperty Value | Sort-Object -Descending -Unique | Select-Object -First 1"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
-
C:\Windows\system32\curl.execurl -L -o python-installer.exe https://www.python.org/ftp/python/3.10.9/python-3.10.9-amd64.exe2⤵PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\empyrean-main\python-installer.exepython-installer.exe /quiet /passive InstallAllUsers=0 PrependPath=1 Include_test=0 Include_pip=1 Include_doc=02⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\Temp\{DAA6B9A4-DB53-4696-BB68-02DBE0FDECF5}\.cr\python-installer.exe"C:\Windows\Temp\{DAA6B9A4-DB53-4696-BB68-02DBE0FDECF5}\.cr\python-installer.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\empyrean-main\python-installer.exe" -burn.filehandle.attached=576 -burn.filehandle.self=744 /quiet /passive InstallAllUsers=0 PrependPath=1 Include_test=0 Include_pip=1 Include_doc=03⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\Temp\{07CEE148-2FF9-49B5-974D-46E7C5D4235F}\.be\python-3.10.9-amd64.exe"C:\Windows\Temp\{07CEE148-2FF9-49B5-974D-46E7C5D4235F}\.be\python-3.10.9-amd64.exe" -q -burn.elevated BurnPipe.{50FC723A-1E7E-4B65-9A9F-F461403BD3F8} {44908751-4A05-4BD8-9834-AF9BEA3D5D71} 28964⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1872
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:1000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
27.6MB
MD5dce578fe177892488cadb6c34aea58ee
SHA1e562807ddd0bc8366d936ce72684ce2b6630e297
SHA256b8c707fb7a3a80f49af5a51c94f428525a3ad4331c7b9e3b2e321caf5cb56d7d
SHA5128858aa7e82ca8cf559eeb25c14d86d24637a86e64c8db7465c99d05558ce3c67cea18d68abdfbe3df08cdbedfca5f819aa7fd8e57beae2054a7f7a8a64c04b41
-
Filesize
650KB
MD564d1e3b44bfce17b6a43e9ca200bfaa2
SHA12617a95208a578c63653b76506b27e36a1ee6bba
SHA256c016025b6e3c1335eef8f544cb88a948d7c785fd5247b994c8ec91a4fce5f899
SHA512002fcb10e7aec037eee5acdbdc20719f10147917330f769943e4342d99a9596df5f09c039be5a8daa871062bf4c7263ae4d6582f971ced570c85abcbea87cc77
-
Filesize
50KB
MD5888eb713a0095756252058c9727e088a
SHA1c14f69f2bef6bc3e2162b4dd78e9df702d94cdb4
SHA25679434bd1368f47f08acf6db66638531d386bf15166d78d9bfea4da164c079067
SHA5127c59f4ada242b19c2299b6789a65a1f34565fed78730c22c904db16a9872fe6a07035c6d46a64ee94501fbcd96de586a8a5303ca22f33da357d455c014820ca0
-
Filesize
849KB
MD5d988448411dc7548332378f7f61508a4
SHA134989539914256ea9f6d691236039d806be6f7ca
SHA256ae5f3d9aaf871d4cf62b3106a7babb66a5c52fdf5ea9b93467c45bd047319c66
SHA512eb631c340bebb6ce3a6100383fe5e5bd8d2b700ca2c9cd07c1bff4decb8b72a9223596786ef0e8040097135765d7af479f3bfa10957abba32143fc9c9b51ce97