Analysis
-
max time kernel
123s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
19-11-2023 13:21
Behavioral task
behavioral1
Sample
SPOILER_Security.py
Resource
win7-20231020-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
SPOILER_Security.py
Resource
win10-20231020-en
3 signatures
150 seconds
Behavioral task
behavioral3
Sample
SPOILER_Security.py
Resource
win10v2004-20231023-en
3 signatures
150 seconds
General
-
Target
SPOILER_Security.py
-
Size
72KB
-
MD5
e1fc8040c41c68a5fed7d8acdf057f7c
-
SHA1
835a6788a7071119f7364bb47a88792d120aca0d
-
SHA256
98b2c9ae09fe577700a5637c7524182f003a546a8f260a142d44fd12deac1b05
-
SHA512
3c4229fc4bc268f1ada7f1386cd3101a32ecaa251eed7a44ad40be5dbf3c7ca98a962084c954207cb0463887a418fa4ea278582bdfdf9e798676ae284ef06b0d
-
SSDEEP
1536:Q1kWRNvthhFSQLhmVpoWDF95YeWB6U/Jf1pge4Fsu:Q1k67hFhhgL95Yea6adpge4Fsu
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1452 OpenWith.exe