Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
21-02-2025 11:06
Behavioral task
behavioral1
Sample
Parental controls intercept.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Parental controls intercept.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
passwords_grabber.pyc
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
passwords_grabber.pyc
Resource
win10v2004-20250217-en
General
-
Target
passwords_grabber.pyc
-
Size
8KB
-
MD5
704dced7f7530b19a34a5f7a71c26b10
-
SHA1
608d9647488cfa2b5f84a891028168a973bfcfa9
-
SHA256
1fd284f1e27263bd2a16050c6989933a382c7d196f4c9f247187cc3b3f6ba3ac
-
SHA512
e4a6710abef2c45d631745c91d8135873be06e5b240a61362e341d05ecc1dedf885487a554b648c328a3c5cc17fcf74e6d066b2e3f51379358ba28c2a0f2f39f
-
SSDEEP
192:+CE34EAL/GFf/PomdPO23NsDmqFUhkxNivLI9dRvL:Y4EAL/AfRBO8NsxuOxNn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2736 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2736 AcroRd32.exe 2736 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1936 1192 cmd.exe 31 PID 1192 wrote to memory of 1936 1192 cmd.exe 31 PID 1192 wrote to memory of 1936 1192 cmd.exe 31 PID 1936 wrote to memory of 2736 1936 rundll32.exe 32 PID 1936 wrote to memory of 2736 1936 rundll32.exe 32 PID 1936 wrote to memory of 2736 1936 rundll32.exe 32 PID 1936 wrote to memory of 2736 1936 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fcfdad72701aaa4bd73ef41faca8cd2e
SHA1eea06aa1c1b00fa703ba70ccef31d50d8f2e7e70
SHA25630edb8161a7c811d6c5fbbe1fa53703c29cbbb62afff76ca42748710509eac7e
SHA512e9c5ac57fa2fb4ee0549610708c5213a1677e6762f9c820bafe24c3a8bb4a8101a16848d5565be146f06482b570b07c7243ea3cab665121aa0f46be36d8e14da