Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 12:42

General

  • Target

    poliigon-addon-blender/operators.py

  • Size

    150KB

  • MD5

    e99b1f90b26aee81824e1e7766adf9ad

  • SHA1

    9bfc31681574f075adaa35c7528a81f1a6eee35d

  • SHA256

    66513d7871394184bdebe150d62cb520b547749a221637dc40c92cc8e0ad13e3

  • SHA512

    c74a6917401ea40e5e2e9908660720f875cff345dcf924f768004b7f5b4fa81e4f25f0c2163d82e7747dd47a69d7dccb621325ba420ccbc1f579faa17e58dc79

  • SSDEEP

    1536:NF2/NTDZabfc7X0p8P93d6iktldGTTUxHN37hga/MSoAYO6LwQESi/fDb:NF2/NE20OiBGEhNGa/MSoAYO1fDb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\poliigon-addon-blender\operators.py
    1⤵
    • Modifies registry class
    PID:2748
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads