Analysis
-
max time kernel
90s -
max time network
201s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-06-2024 11:42
Behavioral task
behavioral1
Sample
xylex.exe
Resource
win11-20240426-en
windows11-21h2-x64
17 signatures
300 seconds
Behavioral task
behavioral2
Sample
Exela.pyc
Resource
win11-20240426-en
windows11-21h2-x64
4 signatures
300 seconds
General
-
Target
Exela.pyc
-
Size
148KB
-
MD5
33ce72d77a78ba8b556ece2f009d4429
-
SHA1
0f912e0d1f749e645385d4bb10ecf2f4ac00012b
-
SHA256
ccf492f0a7d5cd8240f1efa380d26100c604d2387edeb01e3421d70dcdbeb164
-
SHA512
b76abd20e391d5a552de1ec16dda9ff1e2cddb79a0c0343018c6d7be0a48e7497a80cfb6efde3c20e2a1ada76a23bd575103f5650ddb22f0e450ff2ef3a41f78
-
SSDEEP
3072:YGYqtpi7i3srsvepumYhYYYYY9YYw1z/NMOmznnnnnZnnennnnnnn/nennnnnnnU:YGYqtpi7i3sdZYhYYYYY9YYw5Nnms
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4848 OpenWith.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe 4848 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Exela.pyc1⤵
- Modifies registry class
PID:3724
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4848