Analysis

  • max time kernel
    1385s
  • max time network
    1170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 19:56

General

  • Target

    copyreg.pyc

  • Size

    4KB

  • MD5

    b54fec5902723a06d1734bc502b947b4

  • SHA1

    a63a70b5acfc7abcdaf970cc2a43326b5bff4884

  • SHA256

    479d7c95fa69e75116262ae58df374a362843c35cbd1622aa1400509e57eb3dc

  • SHA512

    2e6fb7d27ba4da9a897399abe5b198c776b9f67bfea2047d0da27e6b1ab742df3cfcdacd6a6b3d212f4a3113bc74952f532d9484739c545bac87875ca0e12370

  • SSDEEP

    96:ApCI7QMLHI9jOeSVEZXaruKxbbJJdbTKqvesaCWfqmov2LYHjmTw92qH3TA/CZZ:mvHGvGdruKpbRu4e2WfhhLYHjmTsH3T/

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\copyreg.pyc
    1⤵
    • Modifies registry class
    PID:2096
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads