Overview
overview
10Static
static
3valchecker-main.zip
windows10-1703-x64
1valchecker...xy.txt
windows10-1703-x64
1valchecker...dme.md
windows10-1703-x64
3valchecker...up.bat
windows10-1703-x64
1valchecker...ker.py
windows10-1703-x64
3valchecker...CSS.py
windows10-1703-x64
3valchecker...lic.py
windows10-1703-x64
3valchecker...uth.py
windows10-1703-x64
3valchecker...ers.py
windows10-1703-x64
3valchecker...ata.py
windows10-1703-x64
3valchecker...eck.py
windows10-1703-x64
3valchecker...uff.py
windows10-1703-x64
3valchecker...ems.py
windows10-1703-x64
3valchecker...ort.py
windows10-1703-x64
3valchecker...ain.py
windows10-1703-x64
3valchecker...s.json
windows10-1703-x64
3valchecker...xd.txt
windows10-1703-x64
1valchecker...rt.bat
windows10-1703-x64
1valchecker...er.bat
windows10-1703-x64
10valchecker...re.exe
windows10-1703-x64
7pisos.pyc
windows10-1703-x64
3Analysis
-
max time kernel
398s -
max time network
382s -
platform
windows10-1703_x64 -
resource
win10-20240404-it -
resource tags
arch:x64arch:x86image:win10-20240404-itlocale:it-itos:windows10-1703-x64systemwindows -
submitted
30-04-2024 15:28
Behavioral task
behavioral1
Sample
valchecker-main.zip
Resource
win10-20240404-it
Behavioral task
behavioral2
Sample
valchecker-main/proxy.txt
Resource
win10-20240404-it
Behavioral task
behavioral3
Sample
valchecker-main/readme.md
Resource
win10-20240404-it
Behavioral task
behavioral4
Sample
valchecker-main/setup.bat
Resource
win10-20240404-it
Behavioral task
behavioral5
Sample
valchecker-main/src/checker.py
Resource
win10-20240404-it
Behavioral task
behavioral6
Sample
valchecker-main/src/codeparts/PCSS.py
Resource
win10-20240404-it
Behavioral task
behavioral7
Sample
valchecker-main/src/codeparts/antipublic.py
Resource
win10-20240404-it
Behavioral task
behavioral8
Sample
valchecker-main/src/codeparts/auth.py
Resource
win10-20240404-it
Behavioral task
behavioral9
Sample
valchecker-main/src/codeparts/checkers.py
Resource
win10-20240404-it
Behavioral task
behavioral10
Sample
valchecker-main/src/codeparts/data.py
Resource
win10-20240404-it
Behavioral task
behavioral11
Sample
valchecker-main/src/codeparts/fastcheck.py
Resource
win10-20240404-it
Behavioral task
behavioral12
Sample
valchecker-main/src/codeparts/stuff.py
Resource
win10-20240404-it
Behavioral task
behavioral13
Sample
valchecker-main/src/codeparts/systems.py
Resource
win10-20240404-it
Behavioral task
behavioral14
Sample
valchecker-main/src/codeparts/validsort.py
Resource
win10-20240404-it
Behavioral task
behavioral15
Sample
valchecker-main/src/main.py
Resource
win10-20240404-it
Behavioral task
behavioral16
Sample
valchecker-main/src/system/settings.json
Resource
win10-20240404-it
Behavioral task
behavioral17
Sample
valchecker-main/src/system/xd.txt
Resource
win10-20240404-it
Behavioral task
behavioral18
Sample
valchecker-main/start.bat
Resource
win10-20240404-it
Behavioral task
behavioral19
Sample
valchecker-main/updater.bat
Resource
win10-20240404-it
Behavioral task
behavioral20
Sample
valchecker-main/wifi_anywhere.exe
Resource
win10-20240404-it
Behavioral task
behavioral21
Sample
pisos.pyc
Resource
win10-20240404-it
General
-
Target
valchecker-main/src/codeparts/PCSS.py
-
Size
5KB
-
MD5
2cf60fa75a7c92c264e56f4c094dce50
-
SHA1
1c1bbee2100ad2460bfee7be43fec78ab51c588a
-
SHA256
c3bc73fbe78440513d57dd4a85ae54c62ad5e426d67113a47e8e5ca0e046b1e5
-
SHA512
39a5ce6c9503a47dd1350a37d6245b75b563b367b0dd902fdd3e9b73935a2d813d81df5b954b0c7c7b38d11b37c5ebf864fb14448b8b9f11b7acd82b0f2ffec1
-
SSDEEP
96:Fhq0YFfpHbVVp4BdQOKKPaw7QSQbx+Gz7P7PXpdz/p8b8Td:FJYFfBbVDDOKIaw7Qxx+Gzr7PXN8YTd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe 2056 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2952 2056 OpenWith.exe 75 PID 2056 wrote to memory of 2952 2056 OpenWith.exe 75
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\valchecker-main\src\codeparts\PCSS.py1⤵
- Modifies registry class
PID:1236
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\valchecker-main\src\codeparts\PCSS.py2⤵PID:2952
-