Analysis

  • max time kernel
    315s
  • max time network
    396s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-it
  • resource tags

    arch:x64arch:x86image:win10-20240404-itlocale:it-itos:windows10-1703-x64systemwindows
  • submitted
    30-04-2024 15:28

General

  • Target

    valchecker-main/src/codeparts/auth.py

  • Size

    7KB

  • MD5

    e29bca4f13c775925dd52d2c133011df

  • SHA1

    0691518b93724248a1cf2b70ad6391e1e95fa674

  • SHA256

    bf222959d05938bae4cffdeb299f01a778c0a3c36423c667d66a6629971bd918

  • SHA512

    6767169dbba40ae7e2bba9cca0eb8a3d874fbfd63c60cb69f395ea25f84567960caa01cebb532265f0e23674b95d248fa7aa416c6236e29e4f75a19afbb43664

  • SSDEEP

    96:mNGKhcWm/WzZeEOnBOBlO79ebbV867UP7OqWyAoQnljxV:mNGZ/WzgEABOBlO79e/V8DWyALlj7

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\valchecker-main\src\codeparts\auth.py
    1⤵
    • Modifies registry class
    PID:3520
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads