Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2024 03:48

General

  • Target

    main.pyc

  • Size

    20KB

  • MD5

    9f18589ea99bc9182ca6d2e6b8b4b1fc

  • SHA1

    c9055fd79592ee3c92f229464eb2b6f9092e83b5

  • SHA256

    af84e098284297a8645a5d25865157d13cf9d40c2738af0c2f30e1952137ac70

  • SHA512

    d9b664ec2198ca3f787d43b79d2f02c243de6178c273766465baed607f6c17dfceba7c16375e7ae133e21ce11f61f853a105dd7670b8eb4397e9d5c42b3c978c

  • SSDEEP

    384:auRHWbdFyZ3GgxkFG+RrhK5DXKN6XtMRb3YXwEVHiEjPqloHe/h6aiG4PWP:auRHW5rs+RrOX/9L5juoH8h6aiHPWP

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc
    1⤵
    • Modifies registry class
    PID:5004
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads