Resubmissions

21-11-2024 22:01

241121-1xlvpsyje1 10

21-11-2024 19:51

241121-yks25sznhl 10

19-11-2024 23:42

241119-3p1d8szpeq 10

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 23:42

General

  • Target

    misc.pyc

  • Size

    5KB

  • MD5

    fccbf8762a2d6e382b044d73c9969fbc

  • SHA1

    9530b874a2fb37cef0bdbc13775d64400c6158b4

  • SHA256

    bdadc8d5f54a135e4cad6dd398023cc5a8053619489b38d4b22e104215572f89

  • SHA512

    359b92919a585e4191bceb029e05c9af95816fc023fd5d566d4a5d9fc88b216cace2fe54dacff65decb68d9ad724386467f367a4fadc68b648a44f5b14f84d20

  • SSDEEP

    96:DSajAihmJG4n3B4SmSSSSlSSSShDwegPbbVxlj0oIHEDS5ejmw01k9Bddpq:eYAfn3ySmSSSSlSSSSeeOPVxx0oIHZeQ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\misc.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\misc.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    a45d08d5fa1e896d352524ecf56dc6c8

    SHA1

    3cf6340063eb6737235d85700cb5f9d6b15ee5f6

    SHA256

    10c75b0a6030a871e068dfc2c76e16abed9595ad3b4e422630d01df1db5a53be

    SHA512

    42df8f7a029e362e2325c93b25008e03160e8bd4cb67fc6737330c6e5a7261d05c8c31bf41acb9d046b6553625fcf5da1fd515939f32417c1ef6f744dfe79269