Resubmissions
18-07-2024 14:50
240718-r7nbvawflc 10Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2024 14:50
Behavioral task
behavioral1
Sample
XSpammer.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
15 signatures
150 seconds
Behavioral task
behavioral2
Sample
Boobies.pyc
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Boobies.pyc
-
Size
29KB
-
MD5
87a1ce96d5613ca6d45b1d77c02e8a48
-
SHA1
1dd52434ed50e9a915fd7ee429ddcdd576618f3a
-
SHA256
7bd5059176104056fc3dd3ecdabd09af5a0d4f93debdb36bb1987fb01e88b75d
-
SHA512
b55fde4851d43168be76fd6a2fafc742c637cce8d929e43a72a33b389c9aa91c03b78e4b3a305ad778c7da71b8377063ede2c98aedfec1a5f0f34d155d448848
-
SSDEEP
768:3+lVovnrSxRYjtSD9ASIBg49Uy6navHSpnLrVhHv4q0BSqCJr:30ovr1AvM+navypKBSqQr
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1576 OpenWith.exe