Analysis
-
max time kernel
123s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
dildo rat=jpg dönüştürücü/başlat.bat
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
dildo rat=jpg dönüştürücü/başlat.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
dildo rat=jpg dönüştürücü/kurulum.bat
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
dildo rat=jpg dönüştürücü/kurulum.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
dildo rat=jpg dönüştürücü/main.py
Resource
win7-20231025-en
Behavioral task
behavioral6
Sample
dildo rat=jpg dönüştürücü/main.py
Resource
win10v2004-20231023-en
General
-
Target
dildo rat=jpg dönüştürücü/main.py
-
Size
11KB
-
MD5
bd80af0b8b748d5e3c04ce6707fcf419
-
SHA1
fed9b67696a6c3426a5f31cc49b401882a1d0439
-
SHA256
b50cc170e868fcab0b67cd6be586119f6e00f7ec35d72c9ef18e643b02337cc6
-
SHA512
eab74486af542fb34a2cb8efb51cc8aff6cc8906d5b4ef5d2f15476f4498c368e8b4741b2bf56f1ebaa6b0b0b800ef8b45bd527f323d4fc640a29c284c9fc409
-
SSDEEP
192:VLo1NxipNqpP9w3/ED9QVB0IhzhHZm8Pj8/LBCNt47RYWVBRsMDI/7BRB7/RJ/7N:RaNpP28xIhzh5m8Pj8jBCv47RnVBRI7b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4864 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\dildo rat=jpg dönüştürücü\main.py"1⤵
- Modifies registry class
PID:2884
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4864