Analysis
-
max time kernel
630s -
max time network
632s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 12:52
Behavioral task
behavioral1
Sample
fpsbooster.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
9 signatures
1800 seconds
Behavioral task
behavioral2
Sample
creal.pyc
Resource
win10v2004-20240508-en
windows10-2004-x64
3 signatures
1800 seconds
General
-
Target
creal.pyc
-
Size
33KB
-
MD5
a59bb4d78214a55e59a045da4a26e443
-
SHA1
e560582449e8c14f856f0d2b3d78a7493ebaec2a
-
SHA256
961cb2aade667d7af77ef9aa4faa045bd89fdee37557a567c57b39691dbf429e
-
SHA512
6d9492ee82a5c5a326f6bf9c33537b8ac0a561f8e3800f0bee598d2a308879debb13953e48a36e0d03c3d50af7cf652f22a18f1b72fb4b86113416571bda1496
-
SSDEEP
768:7S9qQoEEnrVJM4rddjrdCtLy+4qJR6v7HO0T0FTtFOzTPElDO0Cv:7+XarsMdjrAti9T0FTtEbEQ02
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1628 OpenWith.exe