Overview
overview
8Static
static
3Debug/Guna.UI.dll
windows7-x64
8Debug/Guna.UI.dll
windows10-2004-x64
1Debug/LetLiner.py
windows7-x64
3Debug/LetLiner.py
windows10-2004-x64
3Debug/Run ...n).bat
windows7-x64
3Debug/Run ...n).bat
windows10-2004-x64
3Debug/Run ...n).bat
windows7-x64
3Debug/Run ...n).bat
windows10-2004-x64
3Debug/Siticone.UI.dll
windows7-x64
1Debug/Siticone.UI.dll
windows10-2004-x64
1Debug/Trox...API.py
windows7-x64
3Debug/Trox...API.py
windows10-2004-x64
3Debug/WCI.bat
windows7-x64
1Debug/WCI.bat
windows10-2004-x64
1Debug/Wann...ce.exe
windows7-x64
1Debug/Wann...ce.exe
windows10-2004-x64
1Debug/Westrox.C.exe
windows7-x64
3Debug/Westrox.C.exe
windows10-2004-x64
3Debug/Wind...er.exe
windows7-x64
1Debug/Wind...er.exe
windows10-2004-x64
1Debug/dat.bat
windows7-x64
3Debug/dat.bat
windows10-2004-x64
3Debug/msg.vbs
windows7-x64
1Debug/msg.vbs
windows10-2004-x64
1Debug/pysx.py
windows7-x64
3Debug/pysx.py
windows10-2004-x64
3Debug/suscribe.vbs
windows7-x64
1Debug/suscribe.vbs
windows10-2004-x64
1Analysis
-
max time kernel
1373s -
max time network
1166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
Debug/Guna.UI.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Debug/Guna.UI.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Debug/LetLiner.py
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Debug/LetLiner.py
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Debug/Run Non Dangerous (admin).bat
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Debug/Run Non Dangerous (admin).bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Debug/Run dangerous (admin).bat
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Debug/Run dangerous (admin).bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
Debug/Siticone.UI.dll
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
Debug/Siticone.UI.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
Debug/Trox_Stealer_API.py
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
Debug/Trox_Stealer_API.py
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
Debug/WCI.bat
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
Debug/WCI.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
Debug/WannaC Custom Interface.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
Debug/WannaC Custom Interface.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
Debug/Westrox.C.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
Debug/Westrox.C.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
Debug/WindowsDefenderTrasher.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
Debug/WindowsDefenderTrasher.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
Debug/dat.bat
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
Debug/dat.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
Debug/msg.vbs
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
Debug/msg.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
Debug/pysx.py
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
Debug/pysx.py
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
Debug/suscribe.vbs
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
Debug/suscribe.vbs
Resource
win10v2004-20230915-en
General
-
Target
Debug/pysx.py
-
Size
781B
-
MD5
56cc7d4984791fd6f4ffa4013cf5480f
-
SHA1
858010d284e91fb8fce2432feda0355dfab61db3
-
SHA256
44202d09a134c8ef211a311acbe494e7ff431db2b76466665d0b351da2c285d6
-
SHA512
0db3d126b699027462e7566c76b2184e2ec912cec1c1a3545af7f3b844afe8a3ebd9c3818f67460dbc259b4403a13aeb1ab4ce7ed3bbceacd5d2f0c9a37269b3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3984 OpenWith.exe