Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 16:52
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20241007-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
4604da24bcbe376086d53e6a20e8e33c
-
SHA1
3ccb807c95887ea85eb4ff04596bdc5404c96e52
-
SHA256
0ab22c47898a6860dc06ce74b149ee696d270742e28180aed06b503a39fb5e85
-
SHA512
8b8fd6cdea3eb636518d8aeafdef9f20cbe6a25845f195cb053718d13a5e0dbd5fd9957caff990fb7051f0438522819ae50bc50762faa673876c310ae45208e1
-
SSDEEP
192:wP3NpgKnD8y2oWdXweWekiGJhwvJmYLMdwQqywnw:ENpr33WuBv2kYLPdw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1832 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 1832 AcroRd32.exe 1832 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2408 wrote to memory of 2556 2408 cmd.exe rundll32.exe PID 2408 wrote to memory of 2556 2408 cmd.exe rundll32.exe PID 2408 wrote to memory of 2556 2408 cmd.exe rundll32.exe PID 2556 wrote to memory of 1832 2556 rundll32.exe AcroRd32.exe PID 2556 wrote to memory of 1832 2556 rundll32.exe AcroRd32.exe PID 2556 wrote to memory of 1832 2556 rundll32.exe AcroRd32.exe PID 2556 wrote to memory of 1832 2556 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ef71a0fda8bd270b420354ef825a99f9
SHA1f7e12d5178736c6e254fd18941721a99146ead97
SHA2569776d14a8e90cc2bc24956af0ab06252605f95d8771f2a15c88f077786c1cdba
SHA512b86ea38f00aac14e42a5134eedcc59638057da94fa75fa58228dc41004279dc1a7f03301c738c14cec9edb7e7e0e0069f6a1e704e30aa00e8edf7cae2cc850f7