Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 13:15
Behavioral task
behavioral1
Sample
UB.GG Spoofer Cracked by Exodus.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
UB.GG Spoofer Cracked by Exodus.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20250314-en
General
-
Target
Stub.pyc
-
Size
874KB
-
MD5
f8f8965fdf61cae85946f9d9fa494a87
-
SHA1
cc50b1d22dc263fdabdc420ee9c51a4cfa7ed9af
-
SHA256
2efbb283ee3a77238f236bffd2d4fc4de1400a986df6457bfab1be4c24850092
-
SHA512
39f6339bcdab430234edf1c5519ed3e4484e88c5b6e06d135842ba8c3938c83cf63913caa6c56fc883d2c6fbf89303af0bfaf71acda1ae260fde19d46ee60c77
-
SSDEEP
24576:5FI+iBDlYn2MEw4F6wwpOP1i+kzagAEMXYMyUe3:PLgqpqrQ3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2552 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 AcroRd32.exe 2552 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2872 2704 cmd.exe 31 PID 2704 wrote to memory of 2872 2704 cmd.exe 31 PID 2704 wrote to memory of 2872 2704 cmd.exe 31 PID 2872 wrote to memory of 2552 2872 rundll32.exe 32 PID 2872 wrote to memory of 2552 2872 rundll32.exe 32 PID 2872 wrote to memory of 2552 2872 rundll32.exe 32 PID 2872 wrote to memory of 2552 2872 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5264d9bd2b883482be579c74f45f53923
SHA1f7e44f2d2104f1c8857ff1eed164f3b99df79b62
SHA256558448760b6b8603f64bd3a139a06344a1c0066108c07f92cad2a3459fd26a3a
SHA5121bced7bd2ab8381ea0ee5cc2203d261bacb2d9b2ffefe487ead897083d948e5def152fe68ed12b04c13c306f1d878b95331eff69db67a1c2e91ec8fff321bcc8