Analysis
-
max time kernel
16s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/01/2025, 02:09
Behavioral task
behavioral1
Sample
Unconfirmed 114637.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Unconfirmed 114637.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20241007-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
16bdd64200062f73c3360e7062f57946
-
SHA1
50acece38db62937896c5471f542be7b425e5374
-
SHA256
662679ab9b492cfb82820d29100411e13c4da8357a12b1c2689aebe821dda803
-
SHA512
35b3dccd0a005b0edaa3da4c622e0a589cf824ab957f5db33b23616b116afdc2f15d9a0fc5d8d69f5f8265ec3ae873acf69cd54f05b55070a8bde15db230f67e
-
SSDEEP
192:wMvm8bD8GMvWdXwo3ThpJimk2JhwGtEnMdwoYxnw:Vm8EvWuSTZbp2jPhxw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2616 AcroRd32.exe 2616 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2752 2284 cmd.exe 29 PID 2284 wrote to memory of 2752 2284 cmd.exe 29 PID 2284 wrote to memory of 2752 2284 cmd.exe 29 PID 2752 wrote to memory of 2616 2752 rundll32.exe 30 PID 2752 wrote to memory of 2616 2752 rundll32.exe 30 PID 2752 wrote to memory of 2616 2752 rundll32.exe 30 PID 2752 wrote to memory of 2616 2752 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52bbf0f82c332863d2de9304a9a0dc235
SHA1b0d9645c223431c431e55f73b3544eb2a9ccae3a
SHA2567b5fd9866bfc5fe459627bff8fda9e1480a29fc2a1f8ac1b99e1d8b3dff3185a
SHA512f08c33f22ac58b4a8d06aabb40ad41f37fb1bfeb0ae18c8a6e21dcc8d9f0a4c67b5137216bf12c0eb59b6df443db4449557e8fec97258365547cb20717ce7a2a