Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 06:28
Behavioral task
behavioral1
Sample
Napalm Loader.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
Napalm Loader.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Napalm Loader.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
README.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
hash.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
napalm_hook.dll
Resource
win10v2004-20240226-en
General
-
Target
Napalm Loader.pyc
-
Size
68KB
-
MD5
b7ca8ee18b13979be009f9cfa57c5f78
-
SHA1
cc706be1d0b96734502203fc726411883b4d55f4
-
SHA256
f412026c2efb1f93cbe70c115eefcf41e52d2a68df4be89da6562ebcd1ed9b56
-
SHA512
3dbfdfae12ca8be43a6bf9f5f93198f592a775a1e0acbb88e8ee91f8719253711e349a0653da9bbdac506e552397dd899c7fa88c1985b82cb2ee27539145dd89
-
SSDEEP
768:52RfPTS6QcmCM26/hfsz6oe+x1F1mAJbX3hElmXTxdhlzJsfCGMq+0AnjEUnrIFO:52E6QhjhQ8AHnxTGCGMq+F4qreO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2000 OpenWith.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2000 wrote to memory of 5032 2000 OpenWith.exe 107 PID 2000 wrote to memory of 5032 2000 OpenWith.exe 107
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Napalm Loader.pyc"1⤵
- Modifies registry class
PID:2244
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Napalm Loader.pyc2⤵PID:5032
-