Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 02:42

General

  • Target

    kam.py

  • Size

    436KB

  • MD5

    b690f8484608d37e6be1b56f6c35e884

  • SHA1

    36225ab9b213dbef29fcc30d6655d5f03974dc10

  • SHA256

    3754b99649942110d10dfdeb03989123f02263547577b3ae844b1da2f60d9e81

  • SHA512

    cf7e2284a5b18975783639fb33bab4302230613632f8194e44fe505cccc5c5a26ea0b575bfb9ab81dba2d8c9822dc76e99abba685f81b9bdedee0261e00cc43d

  • SSDEEP

    12288:ccxcY8r7uqKhRyu/U0o6e4YhYKJbr3Dt51sO:c4cY8uqKhRyCP1LEY2r3rqO

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\kam.py
    1⤵
    • Modifies registry class
    PID:2656
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1004

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads