Analysis

  • max time kernel
    288s
  • max time network
    298s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 12:25

General

  • Target

    syscryptographymodsV2/__init__.py

  • Size

    67KB

  • MD5

    b7ff83e41e2a44e26a94170c77157423

  • SHA1

    654f49112e7a524bb97d80689d502d68a6c655cc

  • SHA256

    35eb26160d7f1d15e6f8944bce0ff4bdb3217329ed42512bbced17377d26cf39

  • SHA512

    f446e7c3e6ae54a25d4922aa8399b48fbb0887870ff99499047b694440cff43264494c446f1ecfd64dc8fbd6b3733faebfefc4a435df00cb91a32b0e9c77e4e0

  • SSDEEP

    768:z0Df0IWlf4pRonswEn51AhRIZ6tftnselCh6AsfLZxt9UZFQVJyCwun25Hf40DhH:M0NSRoWnJ6lRselCh6Agx2zi0dFujN8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\syscryptographymodsV2\__init__.py
    1⤵
    • Modifies registry class
    PID:3980
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1696
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\DismountUndo.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/316-133-0x00007FFEC6A50000-0x00007FFEC6A60000-memory.dmp

    Filesize

    64KB

  • memory/316-134-0x00007FFEC6A50000-0x00007FFEC6A60000-memory.dmp

    Filesize

    64KB

  • memory/316-135-0x00007FFEC6A50000-0x00007FFEC6A60000-memory.dmp

    Filesize

    64KB

  • memory/316-136-0x00007FFEC6A50000-0x00007FFEC6A60000-memory.dmp

    Filesize

    64KB

  • memory/316-137-0x00007FFEC6A50000-0x00007FFEC6A60000-memory.dmp

    Filesize

    64KB

  • memory/316-138-0x00007FFEC49F0000-0x00007FFEC4A00000-memory.dmp

    Filesize

    64KB

  • memory/316-139-0x00007FFEC49F0000-0x00007FFEC4A00000-memory.dmp

    Filesize

    64KB

  • memory/316-162-0x00007FFEC6A50000-0x00007FFEC6A60000-memory.dmp

    Filesize

    64KB

  • memory/316-163-0x00007FFEC6A50000-0x00007FFEC6A60000-memory.dmp

    Filesize

    64KB

  • memory/316-164-0x00007FFEC6A50000-0x00007FFEC6A60000-memory.dmp

    Filesize

    64KB

  • memory/316-165-0x00007FFEC6A50000-0x00007FFEC6A60000-memory.dmp

    Filesize

    64KB