Analysis

  • max time kernel
    1382s
  • max time network
    1173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 16:38

General

  • Target

    Stub.pyc

  • Size

    799KB

  • MD5

    5b1010317f9d2e326825ea6619255c29

  • SHA1

    f4ca66a814fc52e579d63cc51ae4f39a7b43ac06

  • SHA256

    6d0e0e18ff67fa40b8f2455fcc5953360cf56ba3255fbe45e9fd3f0a6130dd0e

  • SHA512

    4eb42ed26aa7a85e8d730dc4c159f54c100af373e368f8d1fd6cebd4093c4bcecf91aea8d5b367d03784a70ee07c54b7f16aeea1d50939ad49bfb2e2221414fb

  • SSDEEP

    12288:G+/3RaioJUngD/ong4CR99VIlZ+rY8j7Vjebge1WbF/jbZCQCTrTZu5PfaG:tBxAKZLaIGrY8j7V6bfW5jbingPB

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc
    1⤵
    • Modifies registry class
    PID:1844
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads