Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 17:52
Behavioral task
behavioral1
Sample
Exela.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Exela.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20250314-en
General
-
Target
Stub.pyc
-
Size
874KB
-
MD5
1878429e557ab3b7c40255159873a138
-
SHA1
424cf7f25e131cc063b25d5f7705732166b4d8b0
-
SHA256
d4d6821b1df9f5640fb71ae5690affa44999f2cec7d2fe2a79100670b9a33e5c
-
SHA512
e3731625096cacf35f08b4d5d3c5434cb11693c250515e7b8469ce0e0afface44801d4219d27c9e6e6b0ffe32901ca7aeb6660091a924d9fc27f9809d8bbb918
-
SSDEEP
12288:sqQYfO1BuUy5b16GHBkj6WhSV/4+WTsa7Oz6gMSaATWX4pzMVHDWFNh+:sqQYOuUy6GtVg9OzNxVpAoFNh+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 432 wrote to memory of 2832 432 cmd.exe 30 PID 432 wrote to memory of 2832 432 cmd.exe 30 PID 432 wrote to memory of 2832 432 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2832
-