Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 17:06
Behavioral task
behavioral1
Sample
CS2.Bhop.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
CS2.Bhop.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20250314-en
General
-
Target
main.pyc
-
Size
12KB
-
MD5
4eca70a8c40dd0d9591f247386b56361
-
SHA1
b3ffc69a18890c0284cefd964c49fbaaebeafc40
-
SHA256
21854f679e29bca4e1e7270a72446d3083381707be93717fe1b17baef55013e6
-
SHA512
9874b92f3a512aeedd95153cfd5b8f8791cd3ade8a03268a05780172d72f9598ea949b1f5bfd4a7b6c6e5dd0676d8428ce0897b068834c82da00ea45eb617476
-
SSDEEP
192:5AjkMIBXELZL9dBUV19SmTM/HXm9CU9FoNIovO:yqSda3km6Xm9rPoNfO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2636 AcroRd32.exe 2636 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2848 2448 cmd.exe 31 PID 2448 wrote to memory of 2848 2448 cmd.exe 31 PID 2448 wrote to memory of 2848 2448 cmd.exe 31 PID 2848 wrote to memory of 2636 2848 rundll32.exe 32 PID 2848 wrote to memory of 2636 2848 rundll32.exe 32 PID 2848 wrote to memory of 2636 2848 rundll32.exe 32 PID 2848 wrote to memory of 2636 2848 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52d69c603d01fbc26b88d6855d5e66023
SHA1be5fb6b2bc3b0f4571c3ea764a6a9481e56c1e2a
SHA256275933b6819e9d011831b542f31365b5a58d434162348f76536f9c80bf8ba509
SHA51202380ae5d333d354743a12ca01d5f10fbfddb58a3bce3cec31f6ea05f84a8d62b5fcfcb578130be66bd2a0a4126d78ec001378755a0db28457e9d66fa5d056ec