Overview
overview
4Static
static
1Bypass.zip
windows11-21h2-x64
1Bypass/bypass.py
windows11-21h2-x64
3Bypass/config.json
windows11-21h2-x64
3Bypass/dat...11.pyc
windows11-21h2-x64
3Bypass/dat...11.pyc
windows11-21h2-x64
3Bypass/dat...req.py
windows11-21h2-x64
3Bypass/dat...ter.py
windows11-21h2-x64
3Bypass/install.bat
windows11-21h2-x64
1python-3.1...64.exe
windows11-21h2-x64
4Analysis
-
max time kernel
447s -
max time network
1172s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-06-2024 09:59
Static task
static1
Behavioral task
behavioral1
Sample
Bypass.zip
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
Bypass/bypass.py
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
Bypass/config.json
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
Bypass/data/addons/__pycache__/req.cpython-311.pyc
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
Bypass/data/addons/__pycache__/updater.cpython-311.pyc
Resource
win11-20240508-en
Behavioral task
behavioral6
Sample
Bypass/data/addons/req.py
Resource
win11-20240426-en
Behavioral task
behavioral7
Sample
Bypass/data/addons/updater.py
Resource
win11-20240426-en
Behavioral task
behavioral8
Sample
Bypass/install.bat
Resource
win11-20240426-en
Behavioral task
behavioral9
Sample
python-3.12.4-amd64.exe
Resource
win11-20240426-en
General
-
Target
Bypass/install.bat
-
Size
715B
-
MD5
14741a4d4fb83a66aad98699db84cf7f
-
SHA1
6b4c747e267a5a67cbedf5daa67b017adf6eacef
-
SHA256
3ce14bbce42e339769dae4ec3ffd8b5150884e159366fbb88699203e76048664
-
SHA512
e28b4309bd985aa7f4ef497ba4ebbe70d4b5914eea0b8e14b8ccc396c08e4060a760e689f533234575998d4abe9af20fd44bdd2e5a87bfd374f2b9c82cdbbac3
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 4864 wrote to memory of 4588 4864 cmd.exe AppInstallerPythonRedirector.exe PID 4864 wrote to memory of 4588 4864 cmd.exe AppInstallerPythonRedirector.exe PID 4864 wrote to memory of 4588 4864 cmd.exe AppInstallerPythonRedirector.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Bypass\install.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exepython bypass.py2⤵PID:4588
-