Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 13:35
Behavioral task
behavioral1
Sample
Beer.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Beer.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20231215-en
General
-
Target
main.pyc
-
Size
129KB
-
MD5
105d0a6d2ae37610e0880619a1ea0bf4
-
SHA1
fc9ef490866cda64b722296c604e21167618d6d7
-
SHA256
7b5ead783a681321ff62b1b5876a351353c566acbb871376bdb0484390cdeb22
-
SHA512
1ac63a238e3369bade1e5d346e9c8200d2770775d527b11a715da2f6a83eed3461972d3810d3f7797b4c5cad133841f3c68f0cde7839e10ef4ac936218515a79
-
SSDEEP
3072:Jf+7o/IsJ9VgavY3A5Fvz7hjYsaaXavtPV8TjsYy:ao/IsjaC0A5Fvz7hjYsaaqtPGTj4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3088 OpenWith.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3088 wrote to memory of 5032 3088 OpenWith.exe 86 PID 3088 wrote to memory of 5032 3088 OpenWith.exe 86 PID 3088 wrote to memory of 5032 3088 OpenWith.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Modifies registry class
PID:3252
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"2⤵PID:5032
-