Analysis
-
max time kernel
92s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 02:48
Behavioral task
behavioral1
Sample
GDS Pizza Massacre.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GDS Pizza Massacre.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Creal.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Creal.pyc
Resource
win10v2004-20231215-en
General
-
Target
Creal.pyc
-
Size
166KB
-
MD5
2d39008b1ed6166c4c5950f36f333d33
-
SHA1
6339d203c155d96a407cb13356049506a2124cb6
-
SHA256
1364c4c10b6126976459d4b5c0b75b417fafa148bd28478034e69084147fbe5e
-
SHA512
df047a8fd84f921f52f969ab066ed15cfbee26bb61a7948374a9c42cb2b01008c176a324b50b30142f111c45ace95fcf9fac1171d674712e5fd2c37a3bbb1da8
-
SSDEEP
3072:56DQeZuz0y/SyFe+B0e/G9kmXucllEKl+xgV+MbZ+:Y8z9qQeOh/G9kmXBllEKlUoI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3140 OpenWith.exe