Resubmissions
04-10-2024 16:44
241004-t8yv3syhpd 1027-09-2024 16:54
240927-vepkzsvbre 1027-09-2024 16:44
240927-t86wpavard 1004-08-2024 18:04
240804-wnq1vawbpg 1003-08-2024 17:26
240803-vzvbzazekn 1003-08-2024 16:14
240803-tpp4tsshqa 1003-08-2024 15:52
240803-tbarzsseqc 1031-07-2024 19:40
240731-ydk3yszdpq 1031-07-2024 10:53
240731-my145atfmf 10Analysis
-
max time kernel
34s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 16:14
Behavioral task
behavioral1
Sample
New folder (8).7z
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
New folder (8).7z
Resource
win10v2004-20240802-en
General
-
Target
New folder (8).7z
-
Size
17.6MB
-
MD5
be23bf21f50efe03646c00428769da08
-
SHA1
588f68a1f66ee0c689104d9096415b9070838827
-
SHA256
0e06e9585cc9db33ee999ca4de668ab64ef6e9fa928ae6541b2f1ec68ff09da8
-
SHA512
b3850d8b79c88e5a1ac7d2855f5b03b08c3392629f041474a997f4c9d71e321c24b9a2c5dad79e8fa6a1bb94648a30808dfa37dbb61e1348fd221594beeda8aa
-
SSDEEP
393216:gTZqJOaXIZoQGPISZpx/0iw+lT+6uxC2JxpG25Bbm:gsJd7ISLW+t+6mCOTdm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
OpenWith.execmd.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid Process 3344 OpenWith.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
OpenWith.exepid Process 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe 3344 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\New folder (8).7z"1⤵
- Modifies registry class
PID:3132
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3344