Analysis
-
max time kernel
44s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 17:18
Behavioral task
behavioral1
Sample
import tkinter as tk.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
import tkinter as tk.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
import tkinter as tk.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
import tkinter as tk.pyc
Resource
win10v2004-20240709-en
General
-
Target
import tkinter as tk.pyc
-
Size
1KB
-
MD5
8e7bc41ff52badc3f299d77497058b39
-
SHA1
40ea95bf21b3ca6984998034606b6dcc19efc4e9
-
SHA256
7634c1aa074a44c58d2525d20530f38dccbddacfca269bb5bab8d6358d225fd9
-
SHA512
654659750da6a8560ca9c7af64e170bbcf853ccd31b128becb5efbd038ab873f0758a8845e7106175ad0378d96433a21a0736711ccad8d46ce08d65ada77f531
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\pyc_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\.pyc\ = "pyc_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\pyc_auto_file\shell\edit\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\pyc_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\pyc_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\pyc_auto_file\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\pyc_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\pyc_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\pyc_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\.pyc OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1204 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe 1204 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1204 wrote to memory of 3032 1204 OpenWith.exe 100 PID 1204 wrote to memory of 3032 1204 OpenWith.exe 100
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\import tkinter as tk.pyc"1⤵
- Modifies registry class
PID:4532
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\import tkinter as tk.pyc2⤵PID:3032
-