Overview
overview
10Static
static
3valchecker-main.zip
windows10-1703-x64
1valchecker...xy.txt
windows10-1703-x64
1valchecker...dme.md
windows10-1703-x64
3valchecker...up.bat
windows10-1703-x64
1valchecker...ker.py
windows10-1703-x64
3valchecker...CSS.py
windows10-1703-x64
3valchecker...lic.py
windows10-1703-x64
3valchecker...uth.py
windows10-1703-x64
3valchecker...ers.py
windows10-1703-x64
3valchecker...ata.py
windows10-1703-x64
3valchecker...eck.py
windows10-1703-x64
3valchecker...uff.py
windows10-1703-x64
3valchecker...ems.py
windows10-1703-x64
3valchecker...ort.py
windows10-1703-x64
3valchecker...ain.py
windows10-1703-x64
3valchecker...s.json
windows10-1703-x64
3valchecker...xd.txt
windows10-1703-x64
1valchecker...rt.bat
windows10-1703-x64
1valchecker...er.bat
windows10-1703-x64
10valchecker...re.exe
windows10-1703-x64
7pisos.pyc
windows10-1703-x64
3Analysis
-
max time kernel
372s -
max time network
394s -
platform
windows10-1703_x64 -
resource
win10-20240404-it -
resource tags
arch:x64arch:x86image:win10-20240404-itlocale:it-itos:windows10-1703-x64systemwindows -
submitted
30-04-2024 15:28
Behavioral task
behavioral1
Sample
valchecker-main.zip
Resource
win10-20240404-it
Behavioral task
behavioral2
Sample
valchecker-main/proxy.txt
Resource
win10-20240404-it
Behavioral task
behavioral3
Sample
valchecker-main/readme.md
Resource
win10-20240404-it
Behavioral task
behavioral4
Sample
valchecker-main/setup.bat
Resource
win10-20240404-it
Behavioral task
behavioral5
Sample
valchecker-main/src/checker.py
Resource
win10-20240404-it
Behavioral task
behavioral6
Sample
valchecker-main/src/codeparts/PCSS.py
Resource
win10-20240404-it
Behavioral task
behavioral7
Sample
valchecker-main/src/codeparts/antipublic.py
Resource
win10-20240404-it
Behavioral task
behavioral8
Sample
valchecker-main/src/codeparts/auth.py
Resource
win10-20240404-it
Behavioral task
behavioral9
Sample
valchecker-main/src/codeparts/checkers.py
Resource
win10-20240404-it
Behavioral task
behavioral10
Sample
valchecker-main/src/codeparts/data.py
Resource
win10-20240404-it
Behavioral task
behavioral11
Sample
valchecker-main/src/codeparts/fastcheck.py
Resource
win10-20240404-it
Behavioral task
behavioral12
Sample
valchecker-main/src/codeparts/stuff.py
Resource
win10-20240404-it
Behavioral task
behavioral13
Sample
valchecker-main/src/codeparts/systems.py
Resource
win10-20240404-it
Behavioral task
behavioral14
Sample
valchecker-main/src/codeparts/validsort.py
Resource
win10-20240404-it
Behavioral task
behavioral15
Sample
valchecker-main/src/main.py
Resource
win10-20240404-it
Behavioral task
behavioral16
Sample
valchecker-main/src/system/settings.json
Resource
win10-20240404-it
Behavioral task
behavioral17
Sample
valchecker-main/src/system/xd.txt
Resource
win10-20240404-it
Behavioral task
behavioral18
Sample
valchecker-main/start.bat
Resource
win10-20240404-it
Behavioral task
behavioral19
Sample
valchecker-main/updater.bat
Resource
win10-20240404-it
Behavioral task
behavioral20
Sample
valchecker-main/wifi_anywhere.exe
Resource
win10-20240404-it
Behavioral task
behavioral21
Sample
pisos.pyc
Resource
win10-20240404-it
General
-
Target
valchecker-main/src/checker.py
-
Size
37KB
-
MD5
a255ffb32b82e3b55f9ad947a1728f58
-
SHA1
934bc0f61066896b54945ce1a926825294c7dad7
-
SHA256
caf6b091117e8002116d70e2aae9177f4b5cfcff8870a497888055a0e00382bd
-
SHA512
7bfcd000e8255c3d6755b7e206ad08bc45a3ca0ca0739d9deaf897ce64a206a3593dc9801d017a767b798934be95b638621d886b10bf95163924346166452d33
-
SSDEEP
384:35RBHZzNM/PXRG+HCaey8QJ1kpLR6RaGLR6RakLR6RaRLR6RaXvdWXnjJni:JRBHZzNM3RG+HJ8QJ1kpRGRkRRRETJi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3404 OpenWith.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3404 wrote to memory of 1864 3404 OpenWith.exe 75 PID 3404 wrote to memory of 1864 3404 OpenWith.exe 75
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\valchecker-main\src\checker.py1⤵
- Modifies registry class
PID:4036
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\valchecker-main\src\checker.py2⤵PID:1864
-