Resubmissions
21/03/2025, 22:06
250321-1z831svnx7 10Analysis
-
max time kernel
33s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 22:06
Behavioral task
behavioral1
Sample
êîìïîíåíòû.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
êîìïîíåíòû.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
êîìïîíåíòû.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
êîìïîíåíòû.exe
Resource
win11-20250314-en
Behavioral task
behavioral5
Sample
Stub.pyc
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Stub.pyc
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Stub.pyc
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral8
Sample
Stub.pyc
Resource
win11-20250313-en
General
-
Target
Stub.pyc
-
Size
875KB
-
MD5
26f39a8eb6de5cc3f75c06854e8f4b2b
-
SHA1
2ee1e427a9509eaf8d41a1d1dabec57b58d8719a
-
SHA256
1eb5198213b7df187db5151666d763ce070b49eaf9a84c826ff100bfe64af5e0
-
SHA512
58e4108b4a2066b1cde7fc6dc24b317f1c0cf70ff922831494f3393b9341c0725153133d45973100211ed09da7cf5d29920af891fcb553d64371f34bd1eb977f
-
SSDEEP
12288:zVhjCvg8g6wuXTIXzSOTjX9XpGrmVWbP8Ujv7xwgBAu7GdPn+C+OnE:JhjCvg8vHOThX8rmM8qqgBn7GVn+CJE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2808 AcroRd32.exe 2808 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2788 2060 cmd.exe 30 PID 2060 wrote to memory of 2788 2060 cmd.exe 30 PID 2060 wrote to memory of 2788 2060 cmd.exe 30 PID 2788 wrote to memory of 2808 2788 rundll32.exe 31 PID 2788 wrote to memory of 2808 2788 rundll32.exe 31 PID 2788 wrote to memory of 2808 2788 rundll32.exe 31 PID 2788 wrote to memory of 2808 2788 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ffa68698e7c7c85376fb9d65629de473
SHA1cb270694e714803d93ddb3c084efb83bccdd32dc
SHA2561ef51eeb379d14c3232a6dd95fd95f43b386bf764a0c9ba26669cd7485d03beb
SHA51289c2f999f649ec8559f377e42d2ad1842bec10a30079639f4e818fa1b6bea9cfb4c56f98f9da01fdb447586da6481397e6d45a5a40da00d3726ab8f1e832284d