Analysis

  • max time kernel
    535s
  • max time network
    592s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    05/04/2024, 16:31

General

  • Target

    main.pyc

  • Size

    55KB

  • MD5

    8b5a848c981a21954ae9ebfbea1a7299

  • SHA1

    e69cde9b7b8c1af8640af8f8ef35ad56a27ef21c

  • SHA256

    e96c51f499a7afed19437cc18899046e57b2a59a1a0de030f2bc8a65a26c937c

  • SHA512

    2a3dcb7626de5f6dc7bb6b81c26b919f5044c7979f51853a200dea27d11294062dbfe63e1e9252f320c9ff1c9fc78ecc6022d409d44d005aa8cde6af5b9c8e01

  • SSDEEP

    384:oPpM3oKsVa+WOaToGx4CcrCT9zBDrA4aGSaM6pEw90simE7QUW8Bq3tkhhM610oO:hb+JA+CcrCxzB3BaGSTVW0sib1hZ1sp

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc
    1⤵
    • Modifies registry class
    PID:4520
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads