Analysis
-
max time kernel
25s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2023 03:16
Behavioral task
behavioral1
Sample
Logger_47747574-2c05-4ef6-8b75-c7c899587272.pyc
Resource
win7-20230831-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Logger_47747574-2c05-4ef6-8b75-c7c899587272.pyc
Resource
win10v2004-20230915-en
3 signatures
150 seconds
General
-
Target
Logger_47747574-2c05-4ef6-8b75-c7c899587272.pyc
-
Size
56KB
-
MD5
9ebe834f63bd4e183bc412ac0d8ed4e0
-
SHA1
9090e96f4be44407a2123d09cef4de36354511b0
-
SHA256
41f323d41163f9a5278453844365c3a32befa83435f227de4d39f1dda9bdc02e
-
SHA512
5a624eeebac7d632e61612d80eba0bf5ab26e789cb3ae0177788f7cb69dc183750a37cc12cc65422e8021df05f6b95dc0e21d0af617bd04dcde6588e8d6bdf8f
-
SSDEEP
768:QnrZA+6Vtg+++X6+R/xcfQ9GUcUrE+OIkkcKfaa1UPbtsOhge4Q3vPLfb2Mjg:mrtV+1R5cTAkkcKziF4Q3bfb2Mk
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4716 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Logger_47747574-2c05-4ef6-8b75-c7c899587272.pyc1⤵
- Modifies registry class
PID:1236
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4716