Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-de
  • resource tags

    arch:x64arch:x86image:win7-20240903-delocale:de-deos:windows7-x64systemwindows
  • submitted
    19-12-2024 16:37

General

  • Target

    source_prepared.pyc

  • Size

    185KB

  • MD5

    b38741010604c31300da52d2f12644bd

  • SHA1

    e9ef16e6e94ebc8340d4045f34c0ec498cb71a0b

  • SHA256

    93b8b3ae10de098a1042bc3be00f9e8ff6c0def6466e4f001824250e102ae1c7

  • SHA512

    801bbe94182df0ab91c116ff3db5186eb4fa7e65c7f0f5a3483a5171e8d417ce7db1042b3ea2d15c2ccea917f9340e53083e12c28842c693453197c68c325e5f

  • SSDEEP

    3072:wTDaLa+/4A9M/2CYolPEtelZN+tVZaftogjHBuCkn0:wT2W+/ZuYol8cN+7ZaftogjH8Ch

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2824
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

      Filesize

      3KB

      MD5

      ae6dfaba226903ecddb57ed2d074cc6f

      SHA1

      aee092106f60b0e9f802235e918f45594d47a71e

      SHA256

      6351dbf3f2dc98202a61a19a546b0fcdab71f49cf6942c368560cec2d105255d

      SHA512

      aaec5a4f55bee53fe8b7980d0b14fc7e9dd5518f3924506e92e009c7b12b9cb399d57222c2b8171c99c388f435e098c7bdb309c8bfa17a1d01c5238554cefb22