Analysis

  • max time kernel
    139s
  • max time network
    264s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2023, 14:13

General

  • Target

    Gengar-Woofer.pyc

  • Size

    69KB

  • MD5

    407059d6ded69e6246e4d3cfc18d017c

  • SHA1

    dd73db2f8a43504eecdc5cccc408d6873ced2f9b

  • SHA256

    aba29b7d54b9c53d5e6d1e527ca1f819dfc649fd1f2a3ff0960e132e2b3cbf7c

  • SHA512

    9bf8276c3c4f0f70e619705c10868685317b4a49384f644c0894a0b8ef6f259502d120bdd725521ec76807825470d52a3f790e5c42d404b229963f7c854f000a

  • SSDEEP

    768:058S3Irw/gMxvCWUL8OsvPi3K2nFcWAXTxcPdCA79/GleK1AnjdRnrBIvy:0XIrYv+SNxjlJKpVrJ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Gengar-Woofer.pyc
    1⤵
    • Modifies registry class
    PID:3712
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads