Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 23:05

General

  • Target

    HydraDragonAntivirus-main/website/tools/removerunwanted.py

  • Size

    863B

  • MD5

    1bd8558881d6be382426c28d9cbcdad5

  • SHA1

    e146523ca5f3f7d915eb3484b2a24cd2488e4e4e

  • SHA256

    6b14764e47f37ff478f90001a74f15d9dcf41ea37f1ac0cdebf4e106334acb58

  • SHA512

    a5fc78689d34354e9e05bd6389fc51c0c45f524c223c0fae8a577ea51c584016fe198f60f0ede59c27874359c8ab479fca796288ddd2f0eb340d82f8d1545c1a

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\HydraDragonAntivirus-main\website\tools\removerunwanted.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\HydraDragonAntivirus-main\website\tools\removerunwanted.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2164
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\HydraDragonAntivirus-main\website\tools\removerunwanted.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    e8057f0ef7ff066dbe91636bf3e96592

    SHA1

    7d1556e4aa86ac67960794f5e49ed18f8e30a0ae

    SHA256

    7aaf1c93e9e9bfb4d8f6878ef10866d0a02a9ca7179d6c8f0f2a375bef8ef664

    SHA512

    7fc2776e364a89b0c37d7e7c1b132bbe3559adc420152b7e80dda6cb463bc6948761f3266e0f46ffc520c01c57940ace1d7bb55e212acd147852ec025158e555