Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 08:29

General

  • Target

    SOSA.pyc

  • Size

    14KB

  • MD5

    29087598f55b19f875ba04c9ccf94ccf

  • SHA1

    725ce1fd2149d36186a88289b49ded17be8d13e6

  • SHA256

    685d53117ad5127cebb8f6423795f078caedacb6c2d4f2e26fe0bb2d4aa95f57

  • SHA512

    8d1f207d45a5563d2b5a7132f8b157b4037c24afa3d875445d39415a0cc6fb636f92627317a794c104e4514c3c231bf53b7cc02fb04274cd16dcf69eedb18987

  • SSDEEP

    192:uJ8x7+tkOU36SfmdMzjzZzHP+MBjGy/OKW70RYgl2zKwuHPu4uRWrFFFO:uJ8x7+tkOU36SfmdMzjzZ5jG0BKNQ8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\SOSA.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SOSA.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SOSA.pyc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2468

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
    Filesize

    3KB

    MD5

    154c3fa786323b4ed79b518c5f329f48

    SHA1

    4d93a4a2e8a539fed3bd655f23b763ebd1703a70

    SHA256

    b1f2acc300c3344d81d0f8e1338a5c030c5133d567c548f459d333767e03ad35

    SHA512

    278b5bf12592241f9695ad210f7a580623a95bfdc402b1b73e4907955d8b4ec967aa811ec86648d7735e68e5e8d5c545dec3650af0ecb69cf25b5d3772580bfa