Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 17:44
Behavioral task
behavioral1
Sample
BLANK-FUCKER-default/dump.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BLANK-FUCKER-default/dump.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
grabber.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
grabber.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
python-3.13.1-amd64.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
python-3.13.1-amd64.exe
Resource
win10v2004-20241007-en
General
-
Target
BLANK-FUCKER-default/dump.py
-
Size
20KB
-
MD5
c5089787607d7498c7670323640bae98
-
SHA1
88ff8c77953dc3ed0dcdc3dc367eee6d28bfe579
-
SHA256
210d06f2c343e14ce193431f9aec912eae6381fbcdcf2d340466e68fb30cad58
-
SHA512
2488cab36125a40e65ecf31315051e55fd4e14c094760f804c06063019790d719f85a9120f93ce9d2068f5d0e1fb32a4b43d3e5f87ee59a7eb275c3d6e998f97
-
SSDEEP
384:sMVutbuVrThQDc130aK+zOUo4XQNRbz4Kpi:sMc6hQavwUo4ANxg
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 860 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 860 AcroRd32.exe 860 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2648 2356 cmd.exe 31 PID 2356 wrote to memory of 2648 2356 cmd.exe 31 PID 2356 wrote to memory of 2648 2356 cmd.exe 31 PID 2648 wrote to memory of 860 2648 rundll32.exe 32 PID 2648 wrote to memory of 860 2648 rundll32.exe 32 PID 2648 wrote to memory of 860 2648 rundll32.exe 32 PID 2648 wrote to memory of 860 2648 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\BLANK-FUCKER-default\dump.py1⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\BLANK-FUCKER-default\dump.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BLANK-FUCKER-default\dump.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD585a5e399eed33a764f24a874856a0ae3
SHA1d40549abb057f394219e3772573babaf9c53eb70
SHA2561daa41e8a987b192cdd0d20364833a07fd20e65a632f81bb53d1abb47d8d0e3c
SHA5120bb039df423a778b347503d9e87a07fec30ca3834c846a045938ff07df610c2bfd20e3bba676cb53681e70a10076b6e08f74e90d87e5dce017e1336ce5525386