Overview
overview
10Static
static
3valchecker-main.zip
windows10-1703-x64
1valchecker...xy.txt
windows10-1703-x64
1valchecker...dme.md
windows10-1703-x64
3valchecker...up.bat
windows10-1703-x64
1valchecker...ker.py
windows10-1703-x64
3valchecker...CSS.py
windows10-1703-x64
3valchecker...lic.py
windows10-1703-x64
3valchecker...uth.py
windows10-1703-x64
3valchecker...ers.py
windows10-1703-x64
3valchecker...ata.py
windows10-1703-x64
3valchecker...eck.py
windows10-1703-x64
3valchecker...uff.py
windows10-1703-x64
3valchecker...ems.py
windows10-1703-x64
3valchecker...ort.py
windows10-1703-x64
3valchecker...ain.py
windows10-1703-x64
3valchecker...s.json
windows10-1703-x64
3valchecker...xd.txt
windows10-1703-x64
1valchecker...rt.bat
windows10-1703-x64
1valchecker...er.bat
windows10-1703-x64
10valchecker...re.exe
windows10-1703-x64
7pisos.pyc
windows10-1703-x64
3Analysis
-
max time kernel
521s -
max time network
569s -
platform
windows10-1703_x64 -
resource
win10-20240404-it -
resource tags
arch:x64arch:x86image:win10-20240404-itlocale:it-itos:windows10-1703-x64systemwindows -
submitted
30-04-2024 15:28
Behavioral task
behavioral1
Sample
valchecker-main.zip
Resource
win10-20240404-it
Behavioral task
behavioral2
Sample
valchecker-main/proxy.txt
Resource
win10-20240404-it
Behavioral task
behavioral3
Sample
valchecker-main/readme.md
Resource
win10-20240404-it
Behavioral task
behavioral4
Sample
valchecker-main/setup.bat
Resource
win10-20240404-it
Behavioral task
behavioral5
Sample
valchecker-main/src/checker.py
Resource
win10-20240404-it
Behavioral task
behavioral6
Sample
valchecker-main/src/codeparts/PCSS.py
Resource
win10-20240404-it
Behavioral task
behavioral7
Sample
valchecker-main/src/codeparts/antipublic.py
Resource
win10-20240404-it
Behavioral task
behavioral8
Sample
valchecker-main/src/codeparts/auth.py
Resource
win10-20240404-it
Behavioral task
behavioral9
Sample
valchecker-main/src/codeparts/checkers.py
Resource
win10-20240404-it
Behavioral task
behavioral10
Sample
valchecker-main/src/codeparts/data.py
Resource
win10-20240404-it
Behavioral task
behavioral11
Sample
valchecker-main/src/codeparts/fastcheck.py
Resource
win10-20240404-it
Behavioral task
behavioral12
Sample
valchecker-main/src/codeparts/stuff.py
Resource
win10-20240404-it
Behavioral task
behavioral13
Sample
valchecker-main/src/codeparts/systems.py
Resource
win10-20240404-it
Behavioral task
behavioral14
Sample
valchecker-main/src/codeparts/validsort.py
Resource
win10-20240404-it
Behavioral task
behavioral15
Sample
valchecker-main/src/main.py
Resource
win10-20240404-it
Behavioral task
behavioral16
Sample
valchecker-main/src/system/settings.json
Resource
win10-20240404-it
Behavioral task
behavioral17
Sample
valchecker-main/src/system/xd.txt
Resource
win10-20240404-it
Behavioral task
behavioral18
Sample
valchecker-main/start.bat
Resource
win10-20240404-it
Behavioral task
behavioral19
Sample
valchecker-main/updater.bat
Resource
win10-20240404-it
Behavioral task
behavioral20
Sample
valchecker-main/wifi_anywhere.exe
Resource
win10-20240404-it
Behavioral task
behavioral21
Sample
pisos.pyc
Resource
win10-20240404-it
General
-
Target
valchecker-main/readme.md
-
Size
513B
-
MD5
a2111f9748ffcd9e064da5e79c388672
-
SHA1
ee56c7eecbc06873f0189d922cd171e8fc00e044
-
SHA256
fd5a2de073a6067cbc10fa2cbaf957426ab1e356be3c5db1a9a037c4ed5b3470
-
SHA512
cc01a6f6279a8d29bb14b6e7bd8b17befa7a71652a4d8cdd473ee001461cb5dbf12428f1e350ecc4a937375b237348bc3a545db00d6e565f7a39d2c81dc0cc58
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1008 OpenWith.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe 1008 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1008 wrote to memory of 4104 1008 OpenWith.exe 76 PID 1008 wrote to memory of 4104 1008 OpenWith.exe 76
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\valchecker-main\readme.md1⤵
- Modifies registry class
PID:316
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\valchecker-main\readme.md2⤵PID:4104
-