Analysis
-
max time kernel
1377s -
max time network
1170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2023 18:13
Static task
static1
Behavioral task
behavioral1
Sample
ip.py
Resource
win10v2004-20231025-en
windows10-2004-x64
3 signatures
1800 seconds
General
-
Target
ip.py
-
Size
974B
-
MD5
cfbaab1d4244fdfc56434724d689c229
-
SHA1
7d77742da38fdd3d6669d2d9d5dcf1ca2d8079f2
-
SHA256
1618fc52f2c8b911903786618f9a1f0e6c91855258d65b6d01247ee1f482adef
-
SHA512
4b45e60eac01a5c2466a4b8b03b484f6adc8a1b30638b45daacf7cba6a45eec2e764a8e12fb645d37c30bb64034fbfc32c761f7c86a903c96305b51708c2b186
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4080 OpenWith.exe