Analysis

  • max time kernel
    89s
  • max time network
    108s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240704-en
  • resource tags

    arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-07-2024 03:41

General

  • Target

    encodings/cp737.pyc

  • Size

    9KB

  • MD5

    8f5e878eeb8069fe198c2bed582d7a0f

  • SHA1

    37140a49ab15c07d1178b7c1a427d0e08617eb27

  • SHA256

    32450767b10571bb7670466b0c3ac379b9c7e3e62c747685a16e0aa6229feaca

  • SHA512

    6136d6b2ea5cacecde18da872f3c7aef152d6f8b8fdeccc2e64c1d1cb827d22bc63ea6b9144e2a59dc370f2fd03002f8c67fb8c870e02a09f70fa4e264fa6544

  • SSDEEP

    192:EHU3Q7f1Rsf+3FemewWeH7bvvEbHZQdn7SJLvqpTbf1U3SNY21:EF/sG3FLeTivc7ZQ8qTbdUn21

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\encodings\cp737.pyc
    1⤵
    • Modifies registry class
    PID:5244
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads