Overview
overview
10Static
static
7file_x86x6...40.dll
windows7-x64
1file_x86x6...40.dll
windows10-2004-x64
1file_x86x6...le.exe
windows7-x64
10file_x86x6...le.exe
windows10-2004-x64
10file_x86x6...40.dll
windows7-x64
1file_x86x6...40.dll
windows10-2004-x64
1file_x86x6..._a.pyc
windows7-x64
3file_x86x6..._a.pyc
windows10-2004-x64
3Analysis
-
max time kernel
133s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 20:33
Behavioral task
behavioral1
Sample
file_x86x64_release/concrt140.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
file_x86x64_release/concrt140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
file_x86x64_release/file.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
file_x86x64_release/file.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
file_x86x64_release/msvcp140.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
file_x86x64_release/msvcp140.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
file_x86x64_release/res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
file_x86x64_release/res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win10v2004-20240426-en
General
-
Target
file_x86x64_release/res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
-
Size
114KB
-
MD5
a2f3ded45da8870e93e5d2186dab27e8
-
SHA1
3f8e0cddecc3827b33ec02cd78d192c18f1ddf82
-
SHA256
fc19237a4e9ae65829dbde384ce0de2c78b22d9577384dded9d4cde569a12742
-
SHA512
438621491061c7f14f59c48d0d2fdd637a17c058df13417e21d660d81632dbb826a6144032f6f9192ab9bb0afb46b8f6cf3982879dc9942261c2538dbd17187c
-
SSDEEP
3072:k6BVH7SBjeSCbupKVfG2yQJ23J+Svsy9k/TukuPMh:zrbKeWmDyQ+13kOPMh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 2104 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\file_x86x64_release\res_mods\1.23.0.0\scripts\client\gui\mods\mod_a.pyc1⤵
- Modifies registry class
PID:2028
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2104