Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-04-2024 03:50
Behavioral task
behavioral1
Sample
Photo.scr
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Photo.scr
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ftpcrack.pyc
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
ftpcrack.pyc
Resource
win10-20240404-en
General
-
Target
ftpcrack.pyc
-
Size
31KB
-
MD5
cdfaeec3b576ee1e801ed0d7981729e9
-
SHA1
d7e34e25732b9e9cf422c5921148e09911c206ec
-
SHA256
153999f48813eed1190adfb2ddf51b73a457ea92563bd54d87aee6220f148cbc
-
SHA512
250b687d2a263bf5c2defa9d57949a0dcf7c8c685836bd064bdb27ef2382b1ed570c7184588d7349b42f89616f2be4631dcca0778772dc23b149036d5bd122ec
-
SSDEEP
768:vJu4RMyRk49Ov7Q0iqhtzZlryou6KGxgP7flAoMT5Kzc5e9DPe7:vJu49Rjg7FiqnZlryoXhuP7lAFlKQeVC
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3212 OpenWith.exe