Analysis
-
max time kernel
1327s -
max time network
1154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 08:35
Behavioral task
behavioral2
Sample
Builder.deps.json
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
Builder.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral4
Sample
Builder.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
Builder.runtimeconfig.json
Resource
win10v2004-20240730-en
Behavioral task
behavioral6
Sample
out/InvictaStealer.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
readme.txt
Resource
win10v2004-20240730-en
General
-
Target
Builder.deps.json
-
Size
413B
-
MD5
d63849c93243f2630d66f6e185dfd38e
-
SHA1
f6439b943edcb1ca8c5b79a966824865b1de6e2a
-
SHA256
fa927bea80bfba0f853c21f84f63411364f57887b18c1ffb9b702ecd2dbef3fe
-
SHA512
7a3ec17a7549ffa3c2a68844f02a86672c3dbc5c5b58b3ec602b2a792807b685cc240ff6780024993cd4b382851a67ed4bf03623299a0fafb56bae01deb5e7b1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2721909339-1374969515-2476821579-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 2168 OpenWith.exe