Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 05:15
Behavioral task
behavioral1
Sample
auxia_updater.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
auxia_updater.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240802-en
General
-
Target
Stub.pyc
-
Size
178KB
-
MD5
03c51d5d2690c613e085153d7cca80a2
-
SHA1
b955fb0d42ea8f445ad6fb2395bf8480e028693a
-
SHA256
0dbff9c19efe825382a31a93808cc9e6ed55c7112788d908e45dd9e382618f18
-
SHA512
431f9bbacab31d405613c740edf147f5c7fdd8ce574e1a3b23787c3a3b5913694313d7a94396b16599f7f81c1675a58f2d968eac39fa2313d3189771caefb584
-
SSDEEP
3072:iPGcc87YoHEj0SsnjCuGUvO92ebnxVZ7uuG6ZX9cvVaNqSgmZ/3MJ1yBx/S0+E:iPGQ7jcvJ92eb1cvVyd3Yy+E
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2424 OpenWith.exe