Analysis

  • max time kernel
    91s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 12:42

General

  • Target

    poliigon-addon-blender/modules/sentry_sdk/integrations/strawberry.py

  • Size

    14KB

  • MD5

    29561b4d4f478b9bb26a0258d7736e6d

  • SHA1

    19a814aa957ff2b850caf86258799b26bd9e2d72

  • SHA256

    d7ab6a40112f5eacceb996d1d5c4e34e1a34574f02d0a74858458aa5c7b8617c

  • SHA512

    1570db76af8e9d51e2f2a40e6dad9d9ad8801910a883dfe454512f88d19a125d14866098bc87b118f91b17b06527d23840ea5373c628350ec65780ae70d8792c

  • SSDEEP

    192:kohrvS4PNLFrijqT3S5pb7/0/hVdNW8TQZW85nD2T4TmNTFTmDn9qdhJrZraMjUs:kyrvS4PviXP/a/f8ZxPqr59aMjnaMOw

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\poliigon-addon-blender\modules\sentry_sdk\integrations\strawberry.py
    1⤵
    • Modifies registry class
    PID:3308
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads