Analysis
-
max time kernel
1s -
max time network
9s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-06-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
amdhip64.dll
Resource
win11-20240611-en
Behavioral task
behavioral2
Sample
concrt140.dll
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win11-20240611-en
Behavioral task
behavioral4
Sample
setup.exe
Resource
win11-20240611-en
Behavioral task
behavioral5
Sample
vvmsvcp140.dll
Resource
win11-20240508-en
General
-
Target
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
-
Size
114KB
-
MD5
a2f3ded45da8870e93e5d2186dab27e8
-
SHA1
3f8e0cddecc3827b33ec02cd78d192c18f1ddf82
-
SHA256
fc19237a4e9ae65829dbde384ce0de2c78b22d9577384dded9d4cde569a12742
-
SHA512
438621491061c7f14f59c48d0d2fdd637a17c058df13417e21d660d81632dbb826a6144032f6f9192ab9bb0afb46b8f6cf3982879dc9942261c2538dbd17187c
-
SSDEEP
3072:k6BVH7SBjeSCbupKVfG2yQJ23J+Svsy9k/TukuPMh:zrbKeWmDyQ+13kOPMh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
OpenWith.execmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3304 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\res_mods\1.23.0.0\scripts\client\gui\mods\mod_a.pyc1⤵
- Modifies registry class
PID:2184
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3304