Analysis

  • max time kernel
    102s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2024 20:22

General

  • Target

    source_prepared.pyc

  • Size

    171KB

  • MD5

    030715424d0dfef63be0b4a0b8664f0f

  • SHA1

    51bfb78fe179ecfc4b72253bbd86fa3887bca5aa

  • SHA256

    e5d8fd82b3125d37bc90769942f440c2cfbbac520ead896300f484f3f3bb9765

  • SHA512

    eebe949a8391616aff7e856a92cd7f48e0793b5cbacf3888f7e8d27ffb41ef73738191519dc7408b7e3811db986a25d6a0c3942ec12f848b7318f8ec24c35646

  • SSDEEP

    3072:mUawFCpYRSFS2SVfXUc2oH7iD6GxrhQpvqdaPFHisilDY:PQpaSpS52our6JqdaPgsKY

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    80b313bb3726c3c77e58106815aff7c1

    SHA1

    bec5cb4efba97f666a88caa485b85ba4210955c1

    SHA256

    30aca95ec6200646b8e6ded027ed274b48ea7a247c671080a760dc9c72787379

    SHA512

    acf0a039f425801e1ab6c2ab41c803bd3edcda875da05333d2872e7b92968ece18efc2e8bf245336285593a32a60765c5ed7d239ed020541182a7a97d2bb0e5e