Overview
overview
10Static
static
10capesolo-0...zer.py
windows7-x64
3capesolo-0...zer.py
windows10-2004-x64
3capesolo-0...ct.exe
windows7-x64
1capesolo-0...ct.exe
windows10-2004-x64
1capesolo-0...64.exe
windows7-x64
1capesolo-0...64.exe
windows10-2004-x64
1capesolo-0...t3.exe
windows7-x64
3capesolo-0...t3.exe
windows10-2004-x64
3capesolo-0...le.exe
windows7-x64
1capesolo-0...le.exe
windows10-2004-x64
3capesolo-0...er.exe
windows7-x64
1capesolo-0...er.exe
windows10-2004-x64
3capesolo-0...64.exe
windows7-x64
1capesolo-0...64.exe
windows10-2004-x64
1capesolo-0...ec.exe
windows7-x64
3capesolo-0...ec.exe
windows10-2004-x64
3capesolo-0...ol.exe
windows7-x64
3capesolo-0...ol.exe
windows10-2004-x64
3capesolo-0...ior.py
windows7-x64
3capesolo-0...ior.py
windows10-2004-x64
3capesolo-0...ils.py
windows7-x64
3capesolo-0...ils.py
windows10-2004-x64
3capesolo-0...tbl.py
windows7-x64
3capesolo-0...tbl.py
windows10-2004-x64
3capesolo-0...log.py
windows7-x64
3capesolo-0...log.py
windows10-2004-x64
3capesolo-0...cts.py
windows7-x64
3capesolo-0...cts.py
windows10-2004-x64
3capesolo-0..._pe.py
windows7-x64
3capesolo-0..._pe.py
windows10-2004-x64
3capesolo-0...ils.py
windows7-x64
3capesolo-0...ils.py
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 01:33
Behavioral task
behavioral1
Sample
capesolo-0.4.13/CAPEsolo/analyzer.py
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
capesolo-0.4.13/CAPEsolo/analyzer.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
capesolo-0.4.13/CAPEsolo/bin/PPLinject.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
capesolo-0.4.13/CAPEsolo/bin/PPLinject.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
capesolo-0.4.13/CAPEsolo/bin/PPLinject64.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
capesolo-0.4.13/CAPEsolo/bin/PPLinject64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
capesolo-0.4.13/CAPEsolo/bin/autoit3.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
capesolo-0.4.13/CAPEsolo/bin/autoit3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
capesolo-0.4.13/CAPEsolo/bin/file.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
capesolo-0.4.13/CAPEsolo/bin/file.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
capesolo-0.4.13/CAPEsolo/bin/loader.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
capesolo-0.4.13/CAPEsolo/bin/loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
capesolo-0.4.13/CAPEsolo/bin/loader_x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
capesolo-0.4.13/CAPEsolo/bin/loader_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
capesolo-0.4.13/CAPEsolo/bin/psexec.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
capesolo-0.4.13/CAPEsolo/bin/psexec.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
capesolo-0.4.13/CAPEsolo/bin/signtool.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
capesolo-0.4.13/CAPEsolo/bin/signtool.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
capesolo-0.4.13/CAPEsolo/capelib/behavior.py
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
capesolo-0.4.13/CAPEsolo/capelib/behavior.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
capesolo-0.4.13/CAPEsolo/capelib/cape_utils.py
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
capesolo-0.4.13/CAPEsolo/capelib/cape_utils.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
capesolo-0.4.13/CAPEsolo/capelib/logtbl.py
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
capesolo-0.4.13/CAPEsolo/capelib/logtbl.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
capesolo-0.4.13/CAPEsolo/capelib/netlog.py
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
capesolo-0.4.13/CAPEsolo/capelib/netlog.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
capesolo-0.4.13/CAPEsolo/capelib/objects.py
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
capesolo-0.4.13/CAPEsolo/capelib/objects.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
capesolo-0.4.13/CAPEsolo/capelib/parse_pe.py
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
capesolo-0.4.13/CAPEsolo/capelib/parse_pe.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
capesolo-0.4.13/CAPEsolo/capelib/path_utils.py
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
capesolo-0.4.13/CAPEsolo/capelib/path_utils.py
Resource
win10v2004-20241007-en
General
-
Target
capesolo-0.4.13/CAPEsolo/capelib/parse_pe.py
-
Size
28KB
-
MD5
661a1e2a686837d53eca831ea72599eb
-
SHA1
58a69265e2c2a30381efdcdfd68b4e0a13673569
-
SHA256
705cbe2d96310371352c370fcc9d46fc5b3c81b55a87a6a533e6d4c05cd5d753
-
SHA512
75950d6d02a8e5d33d02e58c7401e80c88490be91ff1883f44cfe85225ceaaeb852ee08f2bd20c3aa54e9a9fbdffdfa978d8f6437c3ec22ec8f69ad04d6b4924
-
SSDEEP
192:E2hMbnOI9b4qOJpUxLTCEzg20pUPXlub8amXGDDpwZkWC7haLmUaaoGsVWuzgUVP:HMNepUx0pUtuIamkQeXHDkJ04KOFaLuI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 764 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 764 AcroRd32.exe 764 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1924 2416 cmd.exe 31 PID 2416 wrote to memory of 1924 2416 cmd.exe 31 PID 2416 wrote to memory of 1924 2416 cmd.exe 31 PID 1924 wrote to memory of 764 1924 rundll32.exe 33 PID 1924 wrote to memory of 764 1924 rundll32.exe 33 PID 1924 wrote to memory of 764 1924 rundll32.exe 33 PID 1924 wrote to memory of 764 1924 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\capesolo-0.4.13\CAPEsolo\capelib\parse_pe.py1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\capesolo-0.4.13\CAPEsolo\capelib\parse_pe.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\capesolo-0.4.13\CAPEsolo\capelib\parse_pe.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52bf88aac2fd9e21793e4e167d5597d2d
SHA1ab1b3b1c98471f8f935fc25a317d541b67c1a66b
SHA256ae25d76721d0ccdeea6af6816f5d5502dbb25d8ebfbe1003e133e34174255359
SHA51296e09ce2d920770a1e4c12f6fb3913f2b8407f341da5b544217a6d0a00469bd116240e73a4e97974266f0404297cdb975c24a6467ed8d48d50e798e400b251e1