Analysis
-
max time kernel
102s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 00:01
Behavioral task
behavioral1
Sample
EXgen.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EXgen.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
passwords_grabber.pyc
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
passwords_grabber.pyc
Resource
win10v2004-20241007-en
General
-
Target
passwords_grabber.pyc
-
Size
7KB
-
MD5
e51a6ecd8527b9e758afb60513356e19
-
SHA1
89feb7e8f793bef5dc22556196bb9b03387476fe
-
SHA256
3c2a8cf8d20d10c27c1c389064abbcce9aab9d6afe5cac26a376ebedf551bece
-
SHA512
acc505cea3eff572570b05418931b9be9339c0dd91922ce5ef470810bf861f2395535ccab883f470910bb4e0c9dae309382044568ae0a3aba2b9323ada1f784d
-
SSDEEP
192:A114qWLlhuUIxDPK2cMHJb+XUhitovgEuT:64qWLlMFyVMHAE/Y
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2912 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2912 AcroRd32.exe 2912 AcroRd32.exe 2912 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2712 2896 cmd.exe 31 PID 2896 wrote to memory of 2712 2896 cmd.exe 31 PID 2896 wrote to memory of 2712 2896 cmd.exe 31 PID 2712 wrote to memory of 2912 2712 rundll32.exe 32 PID 2712 wrote to memory of 2912 2712 rundll32.exe 32 PID 2712 wrote to memory of 2912 2712 rundll32.exe 32 PID 2712 wrote to memory of 2912 2712 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5715aad9bcef01f613990998b286d2c03
SHA15433c6e84054ebbd39ca930e5f48b101c48fc2b9
SHA256c47daef2ac627acd58ed5d5e15a559acfb931ee11508f1c6b1d638f8301bc6e4
SHA512289c437ab4c1494c971192d90b3aabf02813f0269b4533819c8f84b7d871e1d659b69869ee3b381514335c07cec0df1759a504b08f4ec95648933cf7874e5f48