Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2023 00:17
Behavioral task
behavioral1
Sample
6dd21975f4cab86ed7af322c38e9825971e13cc0b826e278f56d2e411ad4f6f8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6dd21975f4cab86ed7af322c38e9825971e13cc0b826e278f56d2e411ad4f6f8.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
logz.pyc
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
logz.pyc
Resource
win10v2004-20230703-en
General
-
Target
logz.pyc
-
Size
43KB
-
MD5
e8404b29b4fa30815c7588269eba266e
-
SHA1
38a2bcd9687e1d8585d1d80220f1dc02502131ce
-
SHA256
f82ca3bffe904933b523c3a2e42866e66847e1636a22ecc12de839a20dfa982a
-
SHA512
72456fe0714beaf61f8f2f42c0fe509cef16b03b4cb81719c30f7e766d5312510ca9594e2b3984642f64b62a5b24d59f593e0baec5cf79375ab6c942fdb155e6
-
SSDEEP
768:moP7h/z2Q4JESUP/8L541CnVWhc6ceJ+wu0wkWtiPucunDLkgMQFkgLdXNzINMU:ms7h/z2oF8VSCV0cL6Ru07WQfunnRug0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5092 OpenWith.exe