Analysis

  • max time kernel
    82s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/11/2023, 03:05

General

  • Target

    Rose-Grabber-main/resources/source/bin/_file.py

  • Size

    308B

  • MD5

    c81bf2973a33cb913955aff853447a78

  • SHA1

    7eee0c80d097bc75adc7393df44339af0eb40ecb

  • SHA256

    2aa01a8c63bd91087961e661acad557e00aeb43f8fc1ac7debc0a4a77bda6b3d

  • SHA512

    a157de35e034a64e8985cef5e93d422fa934fba9fd15e76010eae2b9a3b5916dac7ba3118278cb8c9a2490b4e20711e8da6c477c0c7764294374c8c040b24ede

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Rose-Grabber-main\resources\source\bin\_file.py
    1⤵
    • Modifies registry class
    PID:3032
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads