Analysis
-
max time kernel
446s -
max time network
1168s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-06-2024 10:05
Behavioral task
behavioral1
Sample
Electron_V3.rar
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
Electron V3/ElectronV3.exe
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
Electron V3/bin/agree.txt
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
Electron V3/scripts/Inf Yield.txt
Resource
win11-20240508-en
Behavioral task
behavioral6
Sample
Electron V3/workspace/IY_FE.iy
Resource
win11-20240426-en
General
-
Target
Electron_V3.rar
-
Size
9.2MB
-
MD5
57c67a45d8337a6e28a4a76d41428137
-
SHA1
a2d30fb658e0e22db2b7589a3f57600f890d49df
-
SHA256
00a1d4c5aed5320d9d225b4f23b567dec0b6a208ae0114150f6d8209be2fd252
-
SHA512
6826c8ab3d02a30cf37270d23cf5375beed38a1a19ec8334084a5cbbac0b6c4b81cfb39a5fcb94929743784df08cce012a6000808f314694bf9ffc0d7824c42b
-
SSDEEP
196608:z3j0MFirWtc9Espk4nM4x1afRMZii+fgW7nLyhz7hn2rRyozEB6OLlkrXJc:z3rVYEspzx14Rs+fgWShXh2rkozIPLlL
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4160 OpenWith.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4160 OpenWith.exe 4160 OpenWith.exe 4160 OpenWith.exe 4160 OpenWith.exe 4160 OpenWith.exe 4160 OpenWith.exe 4160 OpenWith.exe 4160 OpenWith.exe 4160 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Electron_V3.rar1⤵
- Modifies registry class
PID:4860
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4160
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4752