Analysis
-
max time kernel
78s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2024 15:12
Behavioral task
behavioral1
Sample
maple.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
maple/Maple.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
maple/assets/avatars/image.png
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
maple/assets/config.json
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
maple/crack.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
maple/loader.exe
Resource
win10v2004-20240709-en
General
-
Target
main.pyc
-
Size
437B
-
MD5
e3a83cc96bc468e8ed5e99b61ab1b08c
-
SHA1
fc094fba9141e8ace98cce0309e1472b2471b631
-
SHA256
893f6af6a7c380817dd8a1e5f63e72225b82c9775dc8ca40a449ed86c0427932
-
SHA512
6d629486b39cef47bd2ce9b79ff792eebee83e4bdcbb30a756aabcbce75473a732ce2f3e89f0d200a4f9dc98765ce07538a9737cd428b2b372a6d36f4e78630d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid Process 2660 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid Process 3504 OpenWith.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
Processes:
OpenWith.exepid Process 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe 3504 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
OpenWith.exedescription pid Process procid_target PID 3504 wrote to memory of 2660 3504 OpenWith.exe 97 PID 3504 wrote to memory of 2660 3504 OpenWith.exe 97
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Modifies registry class
PID:4572
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:2660
-