Analysis
-
max time kernel
25s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-05-2024 17:05
Behavioral task
behavioral1
Sample
7xsyz7.rar
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
7xsyz7/Defender_Settings.vbs
Resource
win11-20240419-en
Behavioral task
behavioral3
Sample
7xsyz7/ReadMe.txt
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
7xsyz7/dControl.exe
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win11-20240426-en
Behavioral task
behavioral6
Sample
7xsyz7/dControl.ini
Resource
win11-20240426-en
General
-
Target
7xsyz7.rar
-
Size
446KB
-
MD5
f43fed1728c3f42404be3bbf096d645a
-
SHA1
d3beaef94ab3f594be8d2afccf01a1dfd29f4b85
-
SHA256
76ac23bd8fd1e54ec6d0bca29f38acd893fe399cdf72dc16294ac7606593edb1
-
SHA512
59437e3e247019a1ca29a7ffca0fd0d6b996c2df1d13a8e336490862ece5fbd4ba76a7969aa80b92217fd990b9feb2ab4c7e8223a856113c95935f5f82ca4dab
-
SSDEEP
12288:I3QdVHvoDuJugypq23Z4QPYxQpIn/oRC6ygNS1OJJRUX:I3+5AqJu1I2p4QgxQ6/2bNSeO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4912 OpenWith.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7xsyz7.rar1⤵
- Modifies registry class
PID:3292
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4912