Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
e809d5d5507d85b05f67aad87a5616c5acb85267b2cd13ef30ddf3a838e37eb9.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e809d5d5507d85b05f67aad87a5616c5acb85267b2cd13ef30ddf3a838e37eb9.py
Resource
win10v2004-20241007-en
General
-
Target
e809d5d5507d85b05f67aad87a5616c5acb85267b2cd13ef30ddf3a838e37eb9.py
-
Size
7.8MB
-
MD5
bfc3ccdc4d865266733f7a5c07a2f9b5
-
SHA1
fd9cf36b6fbdc730073dcc7aecc00c28b5b10d42
-
SHA256
e809d5d5507d85b05f67aad87a5616c5acb85267b2cd13ef30ddf3a838e37eb9
-
SHA512
4ad5252813bdbbd09ca0fd2eb4019caa622780b766204438da251315f7e10c4379224ad300a8dfdb48a9bfa09003c7297486cf03e86a2a0add61e292c6373eb8
-
SSDEEP
768:qZIz0RqGob4hqwHYNEj0ZN5ObvM0w42+8xV7C2mE+E5fvyXcXHALVIppcB/vrwOc:q6z0RqH7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2792 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2792 AcroRd32.exe 2792 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2356 2296 cmd.exe 31 PID 2296 wrote to memory of 2356 2296 cmd.exe 31 PID 2296 wrote to memory of 2356 2296 cmd.exe 31 PID 2356 wrote to memory of 2792 2356 rundll32.exe 33 PID 2356 wrote to memory of 2792 2356 rundll32.exe 33 PID 2356 wrote to memory of 2792 2356 rundll32.exe 33 PID 2356 wrote to memory of 2792 2356 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\e809d5d5507d85b05f67aad87a5616c5acb85267b2cd13ef30ddf3a838e37eb9.py1⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\e809d5d5507d85b05f67aad87a5616c5acb85267b2cd13ef30ddf3a838e37eb9.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\e809d5d5507d85b05f67aad87a5616c5acb85267b2cd13ef30ddf3a838e37eb9.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD581aa64d824c44fb1800b4f16208b3dcb
SHA1b01dca7dd276e334571965310ef40eeca20b8c60
SHA256c2ca170d9827ac29c3293bd3032a9f0fd1a7bb4e5367a36a6767a5cd35b00a61
SHA5122712e4b226d52a6d4789143e9afc6a23cab1305760636fb198d2dc6082e8f62a721c8af68f51b772486a16f6b462ddbd11afd4416be209c6c22a2905a5e3f1ef