Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 12:21
Behavioral task
behavioral1
Sample
source_assembled.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_assembled.py
Resource
win10v2004-20241007-en
General
-
Target
source_assembled.py
-
Size
171KB
-
MD5
618775ed0e89497a1c19043d0267d52b
-
SHA1
f90330700ff061bbc1f456da2d71d48e6a570dcc
-
SHA256
46f36362515e2c35fa44a99f65da57abd1e650bbe55ba518f980963573ce59d5
-
SHA512
17210baa942f9cc509cf03fb7f744dae9151d6743ffc4d1228a78160e83211b832b62c7bd4d2ec6205d2a9aad6307b9540ce9478290aa7497f147ef4afb5b48a
-
SSDEEP
1536:irZ9yOFCvUAYaAYrW1JUyZll5N8prJrbKSZ0lH/6QxUavdky5Qpurt/rolP:G8rna1JUyZlln8d9Iky5Qpit/YP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2412 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2412 AcroRd32.exe 2412 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2440 wrote to memory of 1036 2440 cmd.exe 29 PID 2440 wrote to memory of 1036 2440 cmd.exe 29 PID 2440 wrote to memory of 1036 2440 cmd.exe 29 PID 1036 wrote to memory of 2412 1036 rundll32.exe 30 PID 1036 wrote to memory of 2412 1036 rundll32.exe 30 PID 1036 wrote to memory of 2412 1036 rundll32.exe 30 PID 1036 wrote to memory of 2412 1036 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\source_assembled.py1⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_assembled.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_assembled.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50c9749da9a5b18a6b9b4947b71e47177
SHA1c53c52524cfbbfe9e5862f33909f6758bb02f51a
SHA256e508ab49f05510d63b093c3c5d62afacb7a59c8e44d0750408a59d56201dab6a
SHA51281287c8746f1e1a6ae70d5bc83d65afe6176ae77d48a782a2fab8dcb8df08a225882d3b74df9aa8606f1f2a90195b84ee0972f4f1c2cfe342bb158c0c4d50acb