Resubmissions
19-03-2024 20:27
240319-y8vwmsfd7z 719-03-2024 20:23
240319-y6lj7afc9w 719-03-2024 20:16
240319-y2lpdsed73 7Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 20:16
Behavioral task
behavioral1
Sample
TTD_TRADE_SCAM_CLIENT.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
TTD_TRADE_SCAM_CLIENT.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
CockiLoggerNEW.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
CockiLoggerNEW.pyc
Resource
win10v2004-20240226-en
General
-
Target
CockiLoggerNEW.pyc
-
Size
10KB
-
MD5
6b47edbefd6c9c6c68420acaed36b20f
-
SHA1
675f8bc0302a4030d0d475f106a4343aedfc7251
-
SHA256
7e1fde40831c2604ed95158d2e3bad7efab63816190bade9d06b22b307047ea2
-
SHA512
35254fefa768366b48f3b3579686701e7fdc15508e9e8fc196f65d75bcc76477d270b4b8ef5753e47b37c5d8826ef5d8d838424d282aab2a66ef0fd24c7234b6
-
SSDEEP
192:KYzQ2Ucq5cNTme0KBjo5OX4CzzA1V0CmGA9FbJut3nyrdyXT:KkBUcqqNT7Bc5o4CzzA1eXU4i
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3404 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 396 OpenWith.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe 396 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 396 wrote to memory of 3404 396 OpenWith.exe 113 PID 396 wrote to memory of 3404 396 OpenWith.exe 113
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CockiLoggerNEW.pyc1⤵
- Modifies registry class
PID:4704
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\CockiLoggerNEW.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:3404
-