Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 22:03
Behavioral task
behavioral1
Sample
hacn.exe
Resource
win10v2004-20240412-en
24 signatures
150 seconds
Behavioral task
behavioral2
Sample
main.pyc
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
main.pyc
-
Size
433B
-
MD5
312dc04abe8390eccc040ae951b7af5f
-
SHA1
6e47cc6d90ab6b101b1c042c6bb317c3e86ca0df
-
SHA256
304fb7638320868400d88a6834fc74fbe88aaca985197c1c8527a9a1ce5f24db
-
SHA512
b91a818687a3a55f4d6ea6f81ed779b7a9429a05f2a70f93f113c0742a2abae32e31eef2d0d62aa25a011c3b66005e4e696e0516aef140a2951fd13c51037dc2
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1088 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3668 OpenWith.exe 3668 OpenWith.exe 3668 OpenWith.exe 3668 OpenWith.exe 3668 OpenWith.exe 3668 OpenWith.exe 3668 OpenWith.exe 3668 OpenWith.exe 3668 OpenWith.exe 3668 OpenWith.exe 3668 OpenWith.exe 3668 OpenWith.exe 3668 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3668 wrote to memory of 1088 3668 OpenWith.exe 92 PID 3668 wrote to memory of 1088 3668 OpenWith.exe 92
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Modifies registry class
PID:4848
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3944 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:3176