Analysis
-
max time kernel
1498s -
max time network
1500s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-05-2024 12:35
Behavioral task
behavioral1
Sample
L3AK.exe
Resource
win11-20240426-en
windows11-21h2-x64
3 signatures
1800 seconds
Behavioral task
behavioral2
Sample
keylogger.pyc
Resource
win11-20240508-en
windows11-21h2-x64
3 signatures
1800 seconds
General
-
Target
keylogger.pyc
-
Size
3KB
-
MD5
73e081c55443aa4ce30a2bf083444759
-
SHA1
38be1c14d2086f1373030baa399338d1a5948a67
-
SHA256
1f7571aae5837ad1989679c9095c5f48fc3682bba11c74c80993baf351ce82cc
-
SHA512
6a333c322184df96af103b0769ef7ec6e389f077331a7a6edb97845b93047707da67a7730dbc869fc3b3980440b72341acb2ec1ee85d44029daed520bb342030
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 2316 OpenWith.exe