Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 03:20
Static task
static1
Behavioral task
behavioral1
Sample
dc221854c9102e1b98cd34e1dd075894e729e2b42634382baca6f35be94875bb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc221854c9102e1b98cd34e1dd075894e729e2b42634382baca6f35be94875bb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Pissant.oth
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Pissant.oth
Resource
win10v2004-20241007-en
General
-
Target
Pissant.oth
-
Size
307KB
-
MD5
94eadbf91852b8c94fc8d0573686e6ac
-
SHA1
d5dbfac6ae55acdd19d0eb76600abc1f58af4915
-
SHA256
79cf086ab60ead9bcf17a5a1b11aaae3ccf6a1307031332cd9aa82ecb59cce35
-
SHA512
90fd1bb36de7e7ea084c7bd89372032a19eb58eefdabcaf2b56b3002b367399f25b642069ba57f5173d1253f50964c068d0f81da3dc760c4cfdac6e4958edbde
-
SSDEEP
6144:jXM5ZpeaorwXv7HauPpHmSq9rIkUxFRoJyNXaLjG+PUZF/dnwQ:DM5ZpywXvbaupI+vRcyNXa5PGFx
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2840 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2840 AcroRd32.exe 2840 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2372 2672 cmd.exe 32 PID 2672 wrote to memory of 2372 2672 cmd.exe 32 PID 2672 wrote to memory of 2372 2672 cmd.exe 32 PID 2372 wrote to memory of 2840 2372 rundll32.exe 33 PID 2372 wrote to memory of 2840 2372 rundll32.exe 33 PID 2372 wrote to memory of 2840 2372 rundll32.exe 33 PID 2372 wrote to memory of 2840 2372 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Pissant.oth1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Pissant.oth2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Pissant.oth"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a10d897167842b504ea447fa99a0cac1
SHA192af09a0918a9701d46eb9be3f679a1dda4b1a21
SHA256f86ce21a1d1fc989260eb174d84a52f29136277dae4a04f6a3dfc0d23923f808
SHA512925ea72895dd9248454b8a8f887bc6f8220b92c5a723627263127db9da88dbe7fbe20650c0ce7deec3c73c87116d162768b4f85d432942c626b74aac025eda05