Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
r2-obf.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
r2-obf.py
Resource
win10v2004-20241007-en
General
-
Target
r2-obf.py
-
Size
4.3MB
-
MD5
de2f0bd073f9d54436194e512879f239
-
SHA1
ebeabce50f20c12c8d795401b9606e88c141d477
-
SHA256
4a3a03949df68c4a69bee1472ba60c5c5b76ba0ac9d9814299adfc45eeec9ac0
-
SHA512
3e409a28d1951af565667ecd565ee29966a399e002400ace3146b852baff20a5e151057b8b1ca599d6d3fc3952cb38497fa7182cd86c254ccb940d367766fe91
-
SSDEEP
768:/D6zB9yR45GGb0ATgLPMkK/28yrSy8Fv8/Q5L2ifasqYmQypY6tTBKezesrTaM36:b6zB9Vlv
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2692 AcroRd32.exe 2692 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1572 2188 cmd.exe 31 PID 2188 wrote to memory of 1572 2188 cmd.exe 31 PID 2188 wrote to memory of 1572 2188 cmd.exe 31 PID 1572 wrote to memory of 2692 1572 rundll32.exe 32 PID 1572 wrote to memory of 2692 1572 rundll32.exe 32 PID 1572 wrote to memory of 2692 1572 rundll32.exe 32 PID 1572 wrote to memory of 2692 1572 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\r2-obf.py1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\r2-obf.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\r2-obf.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55e01eedf0a7683a088a263a28b081dd6
SHA1c2192ff45afd4c7059228c1cc0c90b68fe55425b
SHA25615754f735a985311055a43df5f800479ff60949c95f8bee14111f64683c2e471
SHA512e19ed1e23dd8dd0e85406a9e8fe477c0258b20532b1db3d979057db084c1256213042d6f639f151e7f02e9a3d2989678695ba9838c1c8aa21cbbfa9fdcda2e98