Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 14:01
Behavioral task
behavioral1
Sample
e1d2fa67832a62351e38b4d5c8da62fa.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e1d2fa67832a62351e38b4d5c8da62fa.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Password Generator.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Password Generator.pyc
Resource
win10v2004-20240319-en
General
-
Target
Password Generator.pyc
-
Size
1KB
-
MD5
207db50ab25fa2972a52a18252be04cc
-
SHA1
3504e02cc28fa2e6669641c5d3e99b56b8e02d46
-
SHA256
a156b0e7d9e7e119c4a9a13da67060ea2bcb0375c3534d38c0325bd09ddc6414
-
SHA512
04da8ef94184c5762c28dca67745cc423ddab33dd31f0830c3776c787d09ebf98b8b86d2631fc0cd2afeae54fad857bb211af5706546e4c1b5e9f250a074db91
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe 1420 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1420 wrote to memory of 920 1420 OpenWith.exe 99 PID 1420 wrote to memory of 920 1420 OpenWith.exe 99
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Password Generator.pyc"1⤵
- Modifies registry class
PID:4832
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Password Generator.pyc2⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4084 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:81⤵PID:1080