Resubmissions
06-05-2024 02:28
240506-cx7keaha56 305-05-2024 16:21
240505-ttq7pahh66 319-04-2024 07:38
240419-jgrycach9z 319-04-2024 01:30
240419-bwyensdh4w 318-04-2024 07:41
240418-jjd49sfa88 318-04-2024 04:35
240418-e73ejsbb94 3Analysis
-
max time kernel
602s -
max time network
608s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
spam.py
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
spam.py
Resource
win10v2004-20240412-en
General
-
Target
spam.py
-
Size
744B
-
MD5
d269a9d5a48340bf230519dd91d176ef
-
SHA1
f7f7d9d6eb820f89ddb3a00294961fe17e821af8
-
SHA256
1774c1fb572214f8ab4b5c710d65456442a33c94f249d9ad65284e8c0f55569f
-
SHA512
f45c3385e373635ebf9336f95c35493e17973e61d74b4144935b5b24c2d07c43dbcfc7c302b76250cac3ab5172b4ba5c29d409d85d4fe33d0a7640b74ec6d789
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 228 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4584 OpenWith.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1804 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4584 wrote to memory of 228 4584 OpenWith.exe 97 PID 4584 wrote to memory of 228 4584 OpenWith.exe 97 PID 3616 wrote to memory of 912 3616 cmd.exe 101 PID 3616 wrote to memory of 912 3616 cmd.exe 101
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\spam.py1⤵
- Modifies registry class
PID:3120
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1804
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:320
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\spam.py2⤵
- Opens file in notepad (likely ransom note)
PID:228
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\python.exepython spam.py2⤵PID:912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
746B
MD57df458fb61b4037c619350072787d36f
SHA16244ac61db30a335fce8532553b6081fd338cb26
SHA25684a9212cc61cb2fa59c653d499e09d8e5e6c5ec17579fa05d4a5ac14cf8b66e9
SHA51207edc92ccaf17cdb2583203436c54221182b5e42c4688a164061b639feaf4eeda0a5001ad565912b9d1f25c5b4b4a293b956ed4a21e0b570d1e347363994d620