Analysis
-
max time kernel
81s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2023 16:37
Behavioral task
behavioral1
Sample
Executor.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Executor.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Creal.pyc
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
Creal.pyc
Resource
win10v2004-20231023-en
General
-
Target
Creal.pyc
-
Size
48KB
-
MD5
0fe357b7b7eef2e06a42cafa2e362a98
-
SHA1
7e02240ebde56530ef9057623cbef2e4389df706
-
SHA256
78fd3d61012017a50eb3d00d6179ce90096b94592ea8834a2c23a2296fea36c5
-
SHA512
976ddc13710f6199e75e4d7a5476096eaa736c741ed00d998860ac08e3e4431aaca7666cb66ced42c4aba6ed83df346e44a40e61c0a78ff0877a46d560ac600c
-
SSDEEP
768:PpFnrHya7K+aTMdcmrVWwzO/phReWdXEXuGtz07VOZZ4GQmGw8jt4xMao3Q1:/rSaqMamgphoWdUeOPZZ4GQmGwWaoA
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4740 OpenWith.exe