Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 15:30
Behavioral task
behavioral1
Sample
TF2CDownloaderWindows.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
TF2CDownloaderWindows.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
tf2c_downloader.pyc
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
tf2c_downloader.pyc
Resource
win10v2004-20240226-en
General
-
Target
tf2c_downloader.pyc
-
Size
5KB
-
MD5
985f063219016ac08c590953c4cd0b90
-
SHA1
804ad83879dbe54670827793e3385d217a56bfdb
-
SHA256
54ba0e81c893c3381526504a167c2e396d3c3f85e86f4d9c64aa0b90d2f911cb
-
SHA512
b555247c6424d7f62fb5cbb5c79ae7b6524e65ec5fdf35cb74755c9258cbbe3611e7b74378bf534eef4d632b7b7e5dcc10f1eed6a0d6f9639331d1e0db7cda9a
-
SSDEEP
96:KWw5RovLDMcD4zlMHr46bp63gito2eWerQG5ul2TL4w0RO:KjwnM/zSryLqoZGpkO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2772 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1772 OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe 1772 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2772 1772 OpenWith.exe 104 PID 1772 wrote to memory of 2772 1772 OpenWith.exe 104
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\tf2c_downloader.pyc1⤵
- Modifies registry class
PID:4728
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\tf2c_downloader.pyc2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:2612