Resubmissions
15-04-2024 19:47
240415-yhvsysee92 1011-02-2024 21:53
240211-1rtncsbh6y 1011-02-2024 16:00
240211-tf4wmahe8s 10Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2024 16:00
Behavioral task
behavioral1
Sample
Tools.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Tools.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
creal.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
creal.pyc
Resource
win10v2004-20231215-en
General
-
Target
creal.pyc
-
Size
32KB
-
MD5
651717bdcddac421fd3ffa1e23f14ece
-
SHA1
3074d6ad6c2cbce00a9de2307d1664d80d890c39
-
SHA256
18c562fc51a4b30bca6aeca0e07bd3455b0aab96441dea4be498051783bd80b2
-
SHA512
1c35e2905a026f7eda5dc7675967c7b41ca055f3efe9eb89d5f152160f3bb4165286adad16fcda72834bb684b10627824dfda3187e03990f3703d9d2943dfd9e
-
SSDEEP
768:L8Dnr72VsfNEiyGuAfKFMrRtfqtvEwS7bnjerAroaHjsIAcn8YC06X:IjrveZaKFcfDwS7fuPc8YD6X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1656 OpenWith.exe