Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-11-2024 02:46

General

  • Target

    Condo generator/Extras/unblock_sites.py

  • Size

    1KB

  • MD5

    0d1019573b112545f9fd41a4e0acc342

  • SHA1

    6ab1685e4d4aa3d16307325da3c8c6a65cc1cd2a

  • SHA256

    bf5c32f73990a16835b5b91f08647617dce973a68626ee4921bc5e2c5a07cafe

  • SHA512

    d4cdb37acabfe9013aa8cdec6cce9040a9d9c2b52570fa45f1a0750c29860b161d0446ded2d3f31c61676f42ab2be7c01c8cffc09ae64126510ee2d484e1c561

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Condo generator\Extras\unblock_sites.py"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Condo generator\Extras\unblock_sites.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Condo generator\Extras\unblock_sites.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    9e820d86e4566f9e1e67837c31d310fd

    SHA1

    889914554a579e1145d598ccdb122538f30c63f5

    SHA256

    1c37f315945748c3344b7abce418a25b7af2205ef10b832cca6d38a667b5a34e

    SHA512

    0a3c5e0da5470e457a42822f5d77084b1b6d258afe89b9934ed5981bc8d9447a7c75ee3fb270e65c310bfe58f83b6773b3339bce4cd1deabb2ca605df6ba70af