Analysis
-
max time kernel
34s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 09:47
Behavioral task
behavioral1
Sample
cleaner.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cleaner.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
777.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
777.pyc
Resource
win10v2004-20240226-en
General
-
Target
777.pyc
-
Size
69KB
-
MD5
2f9783ce12e61bdb943011b3391b5816
-
SHA1
fe051b22ac85d9e823a630b8a0addb3aeb74f399
-
SHA256
c77546e9b1ff8cb907bbc0260681b00e6fd6eb38ba41aac243b9bffaa7a1f308
-
SHA512
56e36fcf44bcfa9a6b9245cccd320d932ab381e0097840194c14d6327eb0c0aae3a2a376d6d3af6e47abcba8f9e6231cad345e066393e09e3a50dd23a8ca0219
-
SSDEEP
768:MkW8S3Irw/gMxvCWUL8OsvPi3K2nFcWAXTxcPdCA79/GleK1AnjdRnrBI0Hy:Mk6IrYv+SNxjlJKpVrrS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3196 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe 3308 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3308 wrote to memory of 3196 3308 OpenWith.exe 105 PID 3308 wrote to memory of 3196 3308 OpenWith.exe 105
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\777.pyc1⤵
- Modifies registry class
PID:2500
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\777.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:3196
-