Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2023, 18:58

General

  • Target

    webhook.cpython-39.pyc

  • Size

    957B

  • MD5

    eca2233af56c65f63d0788565a5e2e46

  • SHA1

    7f26ad161ded7f457c915e94a35dc747b9296840

  • SHA256

    48db0923f08f0fbfb7b149387e2ef18362d8c7ee7f4e27d1f2b9f41ca216d77f

  • SHA512

    fbe631353b5e59b2164f7135c77c75cc3044f13c378d2eb285f43971d25ba8826919bf0622e8dba1c25c0f35aeab3e77151100b98fe3c1a1ee21e2a8883e3f00

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\webhook.cpython-39.pyc
    1⤵
    • Modifies registry class
    PID:4272
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4452

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads