Analysis
-
max time kernel
1810s -
max time network
1160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2023, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
Test.py
Resource
win10v2004-20231023-en
3 signatures
1800 seconds
General
-
Target
Test.py
-
Size
20.1MB
-
MD5
4ea41feff9b833a01f710d5fd1e181e6
-
SHA1
78c5692163028439efa3f6e70e5dc3c802ca1449
-
SHA256
a5edc4d2811d9b1f1ebf7f4499e191cdc3c68f222675d6e2ec72b8200d90db9a
-
SHA512
aa47e5a4eed046c60d9a077edb3e922ec76e02d046715073612661e772d6814ec27223ffafab73f1f43282942cf7405e83c3b00664b56be86b6e4e990883382b
-
SSDEEP
768:mjI9Kv8SRFEIXK4R464G87VU/X4C+VJyj/s1RDT8D79Rz1txN:m84v8StKQGNJyj/ODT8D7NtxN
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3752 OpenWith.exe