Analysis
-
max time kernel
83s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2023, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
PyFlooder-master/pyflooder.py
Resource
win7-20221111-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
PyFlooder-master/pyflooder.py
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
PyFlooder-master/pyflooder.py
-
Size
2KB
-
MD5
c9383e37ed7b3c5bd0f6658a94b5a361
-
SHA1
be8b3483081ccd7757b8f416cc75d1e9aa7dd8c1
-
SHA256
528e60f6287395a55628a720c04435127251622e12d43cd680f694f5151700c7
-
SHA512
bbd5b66e3825f4f3380f3b629a341be6e0888bad5ca5d809d3b2cef8b99aef10f531fa4f8674b9dc5814d8e4f5529f0be98b0d8a26b4d43137866bf5022c7d2a
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4640 OpenWith.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe 4640 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\PyFlooder-master\pyflooder.py1⤵
- Modifies registry class
PID:3828
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4640