Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/06/2024, 18:31
Behavioral task
behavioral1
Sample
накрутка YouTube/накрутка Youtube/Youtube.exe
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
py_file.pyc
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
накрутка YouTube/накрутка Youtube/youtube.py
Resource
win11-20240508-en
General
-
Target
py_file.pyc
-
Size
22.5MB
-
MD5
13c3c23f592623ac72f550e9e8c27135
-
SHA1
20b5759997a281d4e8f47b1c58ef989a5c0d469b
-
SHA256
0317f7065e99692254a59c7d81fa37c27b3c55dcd21e9a60bf5e1cc06597504f
-
SHA512
7e4410778c4acc83f6f034bbe2daae4d317268311899d94199fae447cb1fbe5c848826eabd57fad9672333ff57fcffed442a410f296340e080cad9126b6c3c56
-
SSDEEP
393216:sEkZQNS+JL2Vmd6mM0GzajuifrSiq10mFYKLuaUHy0MDTQ9/kJQlnzNN:shQjyVmdEEj2iqptuaD0MDTQU0nH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4972 OpenWith.exe