Resubmissions

24-12-2024 18:54

241224-xkap5atqet 10

24-12-2024 18:53

241224-xjmnastqds 10

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 18:53

General

  • Target

    source_prepared.pyc

  • Size

    156KB

  • MD5

    e7da6e286f372c400a622943f6cd6d13

  • SHA1

    d9f9a44bc629fe4897d1702356fbf5016f6d54f5

  • SHA256

    fb49e8128484e8a0f7a5d374fa18f7baa5d9b683333e7cdc2c6173e31b79551d

  • SHA512

    88722f5422e50f2084a2455e89196a27a39d11cb24646d616726e33eddf9d76a2c979a6679ff7f0835a38230965cb4e645f113ed913b0c4139e41362761eeb8f

  • SSDEEP

    3072:GRXtGdTS2SNNsnoz7iD6GxZhQpYDItSSsiqQU:uEdPSsoqZ6+EsWU

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7d420a6575ecfffb2df6c606523a310b

    SHA1

    038b8538d846226fabdbd8e8fbd1e6cadbe714b4

    SHA256

    4cdf08b78a02910faa34adddb1390ea1fa8da0ce3a1d843de86fa4aa28ec679b

    SHA512

    5bfdbff1eb8c1f6c3f2d1cb9d7963e3b9602e7db47dee36d88128764fa02f45864e8e59b49b1d03d4ba3f4b2ec1217d8827ccca80175b940edd91bf77d7fdc9c