Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 01:14
Behavioral task
behavioral1
Sample
fragment.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fragment.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
fragment.pyc
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
fragment.pyc
Resource
win10v2004-20230703-en
General
-
Target
fragment.pyc
-
Size
49KB
-
MD5
83ef755c82493970454d684b17e267da
-
SHA1
858b6ff36af082786b8e586b46ed56f8502f2cc5
-
SHA256
a158bdbdb76d66d2e6793c273507ca11e69b8c8f607e4207e080964d24975de1
-
SHA512
2e62cfbb2a118e128410d026bd620a42c18498c2b157b8c74db358f4fdede70bd8d8f257bdafbf9fe960416e88181600d98870081c3c6382d16bea4384d9951d
-
SSDEEP
1536:t9MWkg+E5uZnK7SBx4Z1ScGF8RDaVqNeDlhLxFUSgeC:3+E5ekSB+pzRDwUaC
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4428 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4660 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe 4660 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4428 4660 OpenWith.exe 92 PID 4660 wrote to memory of 4428 4660 OpenWith.exe 92
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fragment.pyc1⤵
- Modifies registry class
PID:4568
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\fragment.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:4428
-