Overview
overview
10Static
static
1twstealer.zip
windows10-2004-x64
1twstealer.zip
windows11-21h2-x64
1twstealer/build.bat
windows10-2004-x64
8twstealer/build.bat
windows11-21h2-x64
10twstealer/main.pyw
windows10-2004-x64
3twstealer/main.pyw
windows11-21h2-x64
3twstealer/...k.json
windows10-2004-x64
3twstealer/...k.json
windows11-21h2-x64
3Analysis
-
max time kernel
477s -
max time network
486s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
twstealer.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
twstealer.zip
Resource
win11-20240611-en
Behavioral task
behavioral3
Sample
twstealer/build.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
twstealer/build.bat
Resource
win11-20240611-en
Behavioral task
behavioral5
Sample
twstealer/main.pyw
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
twstealer/main.pyw
Resource
win11-20240611-en
Behavioral task
behavioral7
Sample
twstealer/webhook.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
twstealer/webhook.json
Resource
win11-20240508-en
General
-
Target
twstealer/main.pyw
-
Size
11KB
-
MD5
4613c1511a90aeb0487b07edc3f64ebf
-
SHA1
781a0c0da65d4d9f75670a688db50c7f9593814e
-
SHA256
e3b4bc0d574a0ee64c386cb33757b9b5a7487edb2449b4bb25fbb6a24c31d979
-
SHA512
b738caa7fef1a738df02c03ced79e7c67c06f9c9991390784b9d886639de25cfe6e1834586b9234c87a6b7f56579575e72a92dd8b93f057d7ff5ed469ec0c1c9
-
SSDEEP
192:Rb1gIrIgBHqFR3bN+2XbFlbHubXa2wAmpEcVxGmRfkJ8B/0j3QPB2W7:hYSGEcVxDC2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3336 OpenWith.exe