Analysis
-
max time kernel
315s -
max time network
1608s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22-07-2024 18:38
Behavioral task
behavioral1
Sample
Exela.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Exela.exe
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win11-20240709-en
General
-
Target
Stub.pyc
-
Size
799KB
-
MD5
b5538b9d40603d6816590aef2c71f30e
-
SHA1
aab1cb86da84ef886da30c976c9c56de984393b0
-
SHA256
0ed0d7ae0151bb5954e491042d8ce5730433bebe2fa9922c3157410076e499cb
-
SHA512
14d63b8cc238e87992e929336ed3ace9338bfdeb0d26504abbb752fed14e0670a8b4e5a0e178cdb63b92e8a95f12ee10b159b0bae7d51f0a1ab746acffd09d0b
-
SSDEEP
12288:d+RfL9KYKF8UN9zTMdFd1ZwcCughgkp25jSmfNznHE2T9ODgOy02KlQSnDh3L8:kzgYQjowcCuO5p+GmV7SkK2A4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4764 OpenWith.exe