Analysis

  • max time kernel
    103s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 09:47

General

  • Target

    source_prepared.pyc

  • Size

    171KB

  • MD5

    0033f1902a10722ac1044e734643f8ec

  • SHA1

    9ec97241216021cd11fb2613688f3cb9dbcb4281

  • SHA256

    4150a7a6fe3f978db92bfd7e0d76f048a68a1408787b8c56a47376ba77d9a7db

  • SHA512

    2cf12e7feb4f601896d5c01fb0976e67a27def8331a42109382f626fdd19d37dd3c9770dc0b05582bcdfe00b8968b230be6191e5f3c78c9422d54b03dd9ec90f

  • SSDEEP

    3072:N5UawFHcxY47bS8BVfkD4gon7iD6GxnhQp0pQIesilDY:NESxr7hBjgoOn6awsKY

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    10c1a5ecce18ef4fda45d717bae72b81

    SHA1

    ee114313dc68612828abbd6bc06d6e64d04dfe45

    SHA256

    beb0e2c4dc7ed09dac2f679cd3e6bf24f6b7ee43bd956cc717467f326718ad58

    SHA512

    9a72548a998324c0d02c1e9a9ed7e341252d3b58895fcb59e9ecebb6ed6b5f874ee15502ec0dc2e45b8797a02785ec41cee6aa3dfb794a9c91520ac00a197c99