Overview
overview
10Static
static
1star0pti.zip
windows7-x64
8star0pti.zip
windows10-2004-x64
1star0pti/i...es.jpg
windows7-x64
1star0pti/i...es.jpg
windows10-2004-x64
3star0pti/python.txt
windows7-x64
1star0pti/python.txt
windows10-2004-x64
1star0pti/setup.bat
windows7-x64
10star0pti/setup.bat
windows10-2004-x64
10star0pti/star.py
windows7-x64
3star0pti/star.py
windows10-2004-x64
3star0pti/start.bat
windows7-x64
1star0pti/start.bat
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 10:00
Static task
static1
Behavioral task
behavioral1
Sample
star0pti.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
star0pti.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
star0pti/isaac nudes.jpg
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
star0pti/isaac nudes.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
star0pti/python.txt
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
star0pti/python.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
star0pti/setup.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
star0pti/setup.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
star0pti/star.py
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
star0pti/star.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
star0pti/start.bat
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
star0pti/start.bat
Resource
win10v2004-20241007-en
General
-
Target
star0pti/star.py
-
Size
50KB
-
MD5
782b30a2348d59e4dcc26f9986163cf8
-
SHA1
fab67e59f92986513910d2fce542392ddc4ee6f3
-
SHA256
c37e694a6351bec9a9a605aeae38b7523bf902760496295a711c7321e8227b37
-
SHA512
e9ab3221b7c8130d9049878a636de529e85b93d9af04fd7da324bc23fd5929ae1a276d08acc960f7906aa3968ede08710933bee02975f99b65e222b6eb18bd32
-
SSDEEP
384:IEkPsRW6FBN2P4O4JCtAJOO6ONixeqSNylIAlkhxqT0yIR73P1P2f+oMhItywPIL:IEhFBcZONodlIAlkj2YZd2E4m
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 AcroRd32.exe 2728 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2176 1200 cmd.exe 31 PID 1200 wrote to memory of 2176 1200 cmd.exe 31 PID 1200 wrote to memory of 2176 1200 cmd.exe 31 PID 2176 wrote to memory of 2728 2176 rundll32.exe 33 PID 2176 wrote to memory of 2728 2176 rundll32.exe 33 PID 2176 wrote to memory of 2728 2176 rundll32.exe 33 PID 2176 wrote to memory of 2728 2176 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\star0pti\star.py1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\star0pti\star.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\star0pti\star.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54d142ceb20d72c849f729f6b98036810
SHA17b93ba497a312663af4410ce0fce17339b853150
SHA2560462d6091586a8c9dad9d1bc2df74954b5e8b32d4b84aa498b8e8085eb77b174
SHA512e7e9e1b9651a1e6ad730895c6f9a36c2650398aca89909fa1ba937a6a1173ee30daac98003f847f8ae9d05c7866137be19c4744b756c3355497b0a949f98a115