Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
f181539ea1a6b62a1284e880086561b18804c99c5deb1ffbf6e3b2f2a509db34.py
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f181539ea1a6b62a1284e880086561b18804c99c5deb1ffbf6e3b2f2a509db34.py
Resource
win10v2004-20241007-en
General
-
Target
f181539ea1a6b62a1284e880086561b18804c99c5deb1ffbf6e3b2f2a509db34.py
-
Size
7.5MB
-
MD5
f30b452b28537cc5e4dbf2684d41a837
-
SHA1
3d5756d16e9b568d655a271a0b71e994879032c9
-
SHA256
f181539ea1a6b62a1284e880086561b18804c99c5deb1ffbf6e3b2f2a509db34
-
SHA512
e1f487fed813b345e740ec4f27955ebe7d092749724cf18d079e7b09cb85037d15694f1991c5976ea514fe3941f553081f2b60a7c6634415ce6fac6118e52612
-
SSDEEP
768:thzBW17YFB8B0GnbCjF2BOCyE5dv0KD1katzCx+k2Y5wWaBIzmh5ePYEDiwSriu1:thzB8EF/QD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2608 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2608 AcroRd32.exe 2608 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2832 2288 cmd.exe 29 PID 2288 wrote to memory of 2832 2288 cmd.exe 29 PID 2288 wrote to memory of 2832 2288 cmd.exe 29 PID 2832 wrote to memory of 2608 2832 rundll32.exe 30 PID 2832 wrote to memory of 2608 2832 rundll32.exe 30 PID 2832 wrote to memory of 2608 2832 rundll32.exe 30 PID 2832 wrote to memory of 2608 2832 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\f181539ea1a6b62a1284e880086561b18804c99c5deb1ffbf6e3b2f2a509db34.py1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\f181539ea1a6b62a1284e880086561b18804c99c5deb1ffbf6e3b2f2a509db34.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f181539ea1a6b62a1284e880086561b18804c99c5deb1ffbf6e3b2f2a509db34.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5be5d090a4efe07958c077d89ce346c04
SHA1dcb7505e7cfc92d82804876fa14c4be9f76ca8e9
SHA2566fb4f07c13a6940120801896c05697191b31b06c8ec2d418b044e6d2596438f4
SHA512b0612b9411e6241c67fa1f7101cc9de70ed72f10aef1ac0be7c46c645fb43bd06b9ecb486a9d8824d052a9a2082e24ea53209c5c9ecafb84619e12a2c1a4f837