Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 03:26
Static task
static1
Behavioral task
behavioral1
Sample
dc221854c9102e1b98cd34e1dd075894e729e2b42634382baca6f35be94875bb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc221854c9102e1b98cd34e1dd075894e729e2b42634382baca6f35be94875bb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Pissant.oth
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Pissant.oth
Resource
win10v2004-20241007-en
General
-
Target
Pissant.oth
-
Size
307KB
-
MD5
94eadbf91852b8c94fc8d0573686e6ac
-
SHA1
d5dbfac6ae55acdd19d0eb76600abc1f58af4915
-
SHA256
79cf086ab60ead9bcf17a5a1b11aaae3ccf6a1307031332cd9aa82ecb59cce35
-
SHA512
90fd1bb36de7e7ea084c7bd89372032a19eb58eefdabcaf2b56b3002b367399f25b642069ba57f5173d1253f50964c068d0f81da3dc760c4cfdac6e4958edbde
-
SSDEEP
6144:jXM5ZpeaorwXv7HauPpHmSq9rIkUxFRoJyNXaLjG+PUZF/dnwQ:DM5ZpywXvbaupI+vRcyNXa5PGFx
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1624 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1624 AcroRd32.exe 1624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1668 2844 cmd.exe 29 PID 2844 wrote to memory of 1668 2844 cmd.exe 29 PID 2844 wrote to memory of 1668 2844 cmd.exe 29 PID 1668 wrote to memory of 1624 1668 rundll32.exe 30 PID 1668 wrote to memory of 1624 1668 rundll32.exe 30 PID 1668 wrote to memory of 1624 1668 rundll32.exe 30 PID 1668 wrote to memory of 1624 1668 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Pissant.oth1⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Pissant.oth2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Pissant.oth"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53d5bbf2f46d40ff505e87ff9278645e8
SHA17592f5a817588ecbfb0e368a194a6fc1bfd800f9
SHA2566a810158bee96f642546fa6866a39827f077c18ea47e1187245459a096bf33ca
SHA51268e3f39812c43e327cc4644be3fcd866c39a751aa19cc514e73adbe5755a7e11a63e5c83f7285a28393b36322a8533bd8df08190a214063bec46c50483b0d4b4