Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 12:16
Behavioral task
behavioral1
Sample
source_assembled.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_assembled.py
Resource
win10v2004-20241007-en
General
-
Target
source_assembled.py
-
Size
171KB
-
MD5
618775ed0e89497a1c19043d0267d52b
-
SHA1
f90330700ff061bbc1f456da2d71d48e6a570dcc
-
SHA256
46f36362515e2c35fa44a99f65da57abd1e650bbe55ba518f980963573ce59d5
-
SHA512
17210baa942f9cc509cf03fb7f744dae9151d6743ffc4d1228a78160e83211b832b62c7bd4d2ec6205d2a9aad6307b9540ce9478290aa7497f147ef4afb5b48a
-
SSDEEP
1536:irZ9yOFCvUAYaAYrW1JUyZll5N8prJrbKSZ0lH/6QxUavdky5Qpurt/rolP:G8rna1JUyZlln8d9Iky5Qpit/YP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2828 AcroRd32.exe 2828 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2416 2360 cmd.exe 32 PID 2360 wrote to memory of 2416 2360 cmd.exe 32 PID 2360 wrote to memory of 2416 2360 cmd.exe 32 PID 2416 wrote to memory of 2828 2416 rundll32.exe 33 PID 2416 wrote to memory of 2828 2416 rundll32.exe 33 PID 2416 wrote to memory of 2828 2416 rundll32.exe 33 PID 2416 wrote to memory of 2828 2416 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\source_assembled.py1⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_assembled.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_assembled.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55415b63c7f9af558dde2077bfe0520f1
SHA160dc7e493a7c5e06fbd576fdb4f320102ab1cdcc
SHA2565ce2c49460512dcab2e59a5d9cfc5625d0073d1aedbd9ea792a9fc1bb6bfa956
SHA512ef3b16eaa72427b971b218901be65090c582f1cee97bdd946f63a5f6af33f465cefe707b1e2529d20213ebbbbf1ca40a5a9a77d5991a50b73269b185116614ee