Analysis
-
max time kernel
100s -
max time network
81s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-07-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
main.py
Resource
win10-20240404-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
main.py
-
Size
28KB
-
MD5
34755331d21357a2d6baca0f9e0557f1
-
SHA1
0fdca22309c2de59a94f7eb48976834babd2626c
-
SHA256
3c350efa462acfed622aab5b4acc5cf05ca522d78e6a4c3b4af073921485cbb5
-
SHA512
dec7710d6fc15e8571d532bc999bf6c62b6b127f7b9ee5cccc350be62e507e9756b75a163b220b4d374d10560206270abab7a360862f991f62bcf71b0bc0215f
-
SSDEEP
384:EIRMMoZlb0Eg0kGe/8HDsc5Gm/GS3oZuHkaPB8NEIK:EIR9NEg0Jexbm/GSZMEIK
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1196 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 928 OpenWith.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe 928 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 928 wrote to memory of 1196 928 OpenWith.exe 75 PID 928 wrote to memory of 1196 928 OpenWith.exe 75
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.py1⤵
- Modifies registry class
PID:2872
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\main.py2⤵
- Opens file in notepad (likely ransom note)
PID:1196
-