Overview
overview
7Static
static
3dist.rar
windows7-x64
3dist.rar
windows10-1703-x64
3dist.rar
windows10-2004-x64
3dist.rar
windows11-21h2-x64
3Google Chrome.exe
windows7-x64
7Google Chrome.exe
windows10-1703-x64
7Google Chrome.exe
windows10-2004-x64
7Google Chrome.exe
windows11-21h2-x64
7python-3.1...64.exe
windows7-x64
4python-3.1...64.exe
windows10-1703-x64
4python-3.1...64.exe
windows10-2004-x64
4python-3.1...64.exe
windows11-21h2-x64
4Analysis
-
max time kernel
428s -
max time network
1159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 00:47
Behavioral task
behavioral1
Sample
dist.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dist.rar
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
dist.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
dist.rar
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
Google Chrome.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Google Chrome.exe
Resource
win10-20240611-en
Behavioral task
behavioral7
Sample
Google Chrome.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
Google Chrome.exe
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
python-3.12.4-amd64.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
python-3.12.4-amd64.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
python-3.12.4-amd64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
python-3.12.4-amd64.exe
Resource
win11-20240709-en
General
-
Target
dist.rar
-
Size
37.4MB
-
MD5
8a8a9030d173404c2a53af079f2b71df
-
SHA1
d571676f253e9d699fe44049b4b3722b31b129bf
-
SHA256
75394720eeac13ec96807bcd1b2f71da6eda1ef8976a2ecb1bf715acb4701f85
-
SHA512
704e7988d3b0bf9155246e19d6654fa40f3e184d917532958678365d763146ea3c52f302d5e3518bb0eab2bce54e0c591d1dcfca11a800ec1158dbc173b2499e
-
SSDEEP
786432:P9ZQFyhDHLq8tuFiQSVKOFIoZToF7pre6LJQOsdfBJLf2btHjndof0V9:Pg8hDHbtu8QsIrVNemwdfBdf2ZO0T
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 5088 OpenWith.exe