Analysis
-
max time kernel
62s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
06-07-2023 15:15
Static task
static1
Behavioral task
behavioral1
Sample
sh.py
Resource
win10-20230703-en
windows10-1703-x64
3 signatures
150 seconds
General
-
Target
sh.py
-
Size
11KB
-
MD5
7c7cd27b91a6f5bf3271f47b4dc32d54
-
SHA1
bd8626420ecfd1ab5f4576d83be35edecd8fa70e
-
SHA256
aa951c053baf011d08f3a60a10c1d09bbac32f332413db5b38b8737558a08dc1
-
SHA512
fd46e3c593a5b85c0a7ab59e5361a7b99b8810ee7361e0b0ef6e42b915f42415ed4de75200d0c2c10e376d36776c2af64a6a08865836d41387c34d83d680ea14
-
SSDEEP
192:AoOZp3p5iP7XRSr3YcsWrM8Y3SwUNDolMlB4ayY/dpYXEbskb5yD8ML+A5mVlnOJ:AXdgjXc7YcsW43iHNruEbsw5yDv+DDq
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4175128012-676912335-1083716439-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4175128012-676912335-1083716439-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1528 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sh.py1⤵
- Modifies registry class
PID:3828
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1528
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2468
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:4012