Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 06:20
Behavioral task
behavioral1
Sample
overlay_3.0.4.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
overlay_3.0.4.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
bwstats.pyc
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
bwstats.pyc
Resource
win10v2004-20240508-en
General
-
Target
bwstats.pyc
-
Size
37KB
-
MD5
f7f90fb79f9d96545e66b982b11784b9
-
SHA1
a9eec1150ca723fa0dc3ac3488263749850b9597
-
SHA256
3bc98e6f25d4416afaedff5d79567dec4c29b445d4ba786588ec20efd6cac668
-
SHA512
0e632109286a1851fc81ecb625345edb273bcd74760947f100937e63b93bf797ed99e5831adde120ab550b30d289fcdc85ea834be05d05cdacc3d2885b7dfdda
-
SSDEEP
768:f2czKTz+XmercYg6hrmRiPE3VBc7HN2MHiYhpWJfYxHk2kqDAfBPWL9snvI5aMj9:f2czKTz+XmerXg6hrmAPE3L0H8MHiYh/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3196 OpenWith.exe