Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
04-04-2024 21:05
Behavioral task
behavioral1
Sample
PandaPasswords.rar
Resource
win10-20240404-en
windows10-1703-x64
4 signatures
150 seconds
General
-
Target
PandaPasswords.rar
-
Size
7.2MB
-
MD5
25399c8e2ca04e3c3c4180687997a316
-
SHA1
e6ae53c6a74bf607144515a8a492f164d86d6472
-
SHA256
eb72729b713882d6fa23e0c25a0b3e734f281d44fac179d7b9e898c169ee1e46
-
SHA512
4171b322bb51bfc87473799c64a711669faa7418a61ddc92fb18583a41fb30fac86df22dd1f8b54e6f645983cceda058878b7518a60cb29d15dc4efb2bc49848
-
SSDEEP
196608:P5MyK24Jg2SRJ1FJXBdkTRDq+c1UpEEyDktlxEdlD4:PRK24J23NU4+c+2RDoMZ4
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2492 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe 2492 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\PandaPasswords.rar1⤵
- Modifies registry class
PID:4664
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2492