Analysis

  • max time kernel
    42s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 14:24

General

  • Target

    cstealer.pyc

  • Size

    67KB

  • MD5

    380fb181fbfee35d71f14e2d1a1df1c7

  • SHA1

    f991d3803a6ac70bd017175e289c95d52a3808ca

  • SHA256

    62efea82da680bd54e4917cca7553c9bf1ce6a7290df986d612115dd9df683b7

  • SHA512

    393c1b167eeaa3007282f78744dc197fab35cd0502ebd9de171e9006dae92f61a6001ae53ff62e135480fc689ea3427928cba559bdd0291cf20c311a05d44572

  • SSDEEP

    1536:l0xqOgPtxpqBJlMstbo88jLQQcXf9qS0Vr+LRheF:lqQt/+bo88PiXX0r+LRA

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\cstealer.pyc
    1⤵
    • Modifies registry class
    PID:528
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads