Overview
overview
10Static
static
10capesolo-0...zer.py
windows7-x64
3capesolo-0...zer.py
windows10-2004-x64
3capesolo-0...ct.exe
windows7-x64
1capesolo-0...ct.exe
windows10-2004-x64
1capesolo-0...64.exe
windows7-x64
1capesolo-0...64.exe
windows10-2004-x64
1capesolo-0...t3.exe
windows7-x64
3capesolo-0...t3.exe
windows10-2004-x64
3capesolo-0...le.exe
windows7-x64
1capesolo-0...le.exe
windows10-2004-x64
3capesolo-0...er.exe
windows7-x64
1capesolo-0...er.exe
windows10-2004-x64
3capesolo-0...64.exe
windows7-x64
1capesolo-0...64.exe
windows10-2004-x64
1capesolo-0...ec.exe
windows7-x64
3capesolo-0...ec.exe
windows10-2004-x64
3capesolo-0...ol.exe
windows7-x64
3capesolo-0...ol.exe
windows10-2004-x64
3capesolo-0...ior.py
windows7-x64
3capesolo-0...ior.py
windows10-2004-x64
3capesolo-0...ils.py
windows7-x64
3capesolo-0...ils.py
windows10-2004-x64
3capesolo-0...tbl.py
windows7-x64
3capesolo-0...tbl.py
windows10-2004-x64
3capesolo-0...log.py
windows7-x64
3capesolo-0...log.py
windows10-2004-x64
3capesolo-0...cts.py
windows7-x64
3capesolo-0...cts.py
windows10-2004-x64
3capesolo-0..._pe.py
windows7-x64
3capesolo-0..._pe.py
windows10-2004-x64
3capesolo-0...ils.py
windows7-x64
3capesolo-0...ils.py
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-11-2024 01:15
Behavioral task
behavioral1
Sample
capesolo-0.4.11/CAPEsolo/analyzer.py
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
capesolo-0.4.11/CAPEsolo/analyzer.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
capesolo-0.4.11/CAPEsolo/bin/PPLinject.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
capesolo-0.4.11/CAPEsolo/bin/PPLinject.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
capesolo-0.4.11/CAPEsolo/bin/PPLinject64.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
capesolo-0.4.11/CAPEsolo/bin/PPLinject64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
capesolo-0.4.11/CAPEsolo/bin/autoit3.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
capesolo-0.4.11/CAPEsolo/bin/autoit3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
capesolo-0.4.11/CAPEsolo/bin/file.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
capesolo-0.4.11/CAPEsolo/bin/file.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
capesolo-0.4.11/CAPEsolo/bin/loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
capesolo-0.4.11/CAPEsolo/bin/loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
capesolo-0.4.11/CAPEsolo/bin/loader_x64.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
capesolo-0.4.11/CAPEsolo/bin/loader_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
capesolo-0.4.11/CAPEsolo/bin/psexec.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
capesolo-0.4.11/CAPEsolo/bin/psexec.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
capesolo-0.4.11/CAPEsolo/bin/signtool.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
capesolo-0.4.11/CAPEsolo/bin/signtool.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
capesolo-0.4.11/CAPEsolo/capelib/behavior.py
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
capesolo-0.4.11/CAPEsolo/capelib/behavior.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
capesolo-0.4.11/CAPEsolo/capelib/cape_utils.py
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
capesolo-0.4.11/CAPEsolo/capelib/cape_utils.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
capesolo-0.4.11/CAPEsolo/capelib/logtbl.py
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
capesolo-0.4.11/CAPEsolo/capelib/logtbl.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
capesolo-0.4.11/CAPEsolo/capelib/netlog.py
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
capesolo-0.4.11/CAPEsolo/capelib/netlog.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
capesolo-0.4.11/CAPEsolo/capelib/objects.py
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
capesolo-0.4.11/CAPEsolo/capelib/objects.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
capesolo-0.4.11/CAPEsolo/capelib/parse_pe.py
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
capesolo-0.4.11/CAPEsolo/capelib/parse_pe.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
capesolo-0.4.11/CAPEsolo/capelib/path_utils.py
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
capesolo-0.4.11/CAPEsolo/capelib/path_utils.py
Resource
win10v2004-20241007-en
General
-
Target
capesolo-0.4.11/CAPEsolo/capelib/behavior.py
-
Size
43KB
-
MD5
2b936b836048ecad84e7a10137f6d411
-
SHA1
a966c20f6c77b60e8f1975635d217ffd10a927f6
-
SHA256
8a88d81ef3369cc44d6014ad0701bb49985d62dab888541f7fbb53081256c140
-
SHA512
59c13953e0f56dee87b894826f2f9dc70a90c5a15cc92d0c733e0d68ae954052957b5a33ea810825bfe6f318f5453e9081ae8e0553186e8f2bb77d3c5648264f
-
SSDEEP
768:6EvWuj+8z8YcE1Oa1J9+ULqtsYPH+LwbIxRjg:n9j+8z8Y1OaIU+tsY/+LQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 3020 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 3020 AcroRd32.exe 3020 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1588 wrote to memory of 1520 1588 cmd.exe rundll32.exe PID 1588 wrote to memory of 1520 1588 cmd.exe rundll32.exe PID 1588 wrote to memory of 1520 1588 cmd.exe rundll32.exe PID 1520 wrote to memory of 3020 1520 rundll32.exe AcroRd32.exe PID 1520 wrote to memory of 3020 1520 rundll32.exe AcroRd32.exe PID 1520 wrote to memory of 3020 1520 rundll32.exe AcroRd32.exe PID 1520 wrote to memory of 3020 1520 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\capesolo-0.4.11\CAPEsolo\capelib\behavior.py1⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\capesolo-0.4.11\CAPEsolo\capelib\behavior.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\capesolo-0.4.11\CAPEsolo\capelib\behavior.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59a76446f332af6d3648760197a336c46
SHA1fb336f6cc0ad58f575ba29ec59605a535410cf40
SHA2569ace4876424e225d5d31c3e58e6d92b609492bda4d5d9955a4a70dd9f0ccf507
SHA51223b785cca6c1225b0732f2ba54918bff0d3f1c629dafe3bf8ed416d5b59105e3ec338cbc9f995b11d8e4e2dced562783edaa3892839af078308e50d69d636421