Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-08-2024 15:09

General

  • Target

    BEST NEW RAID TOOL/RTBFiles/ServerSmasher/__pycache__/smconfig.cpython-39.pyc

  • Size

    1003B

  • MD5

    4acbf032ba9a23635bfbd4fd3ff8e3e5

  • SHA1

    4c745127a0b5a76ceca9376c34d848e185f3de93

  • SHA256

    28401c8061858717a083f2305deb19bc8460d00e0f223f1c4acd843d94fa530e

  • SHA512

    beab711cbed6274394c6af1dff4762b96c6fc98188bf9fcabca4d9897b885d9bb3e3d2faeb13f4a75e040e7d64cd4ae07604ae9e2d7a04c8782d378460705996

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\BEST NEW RAID TOOL\RTBFiles\ServerSmasher\__pycache__\smconfig.cpython-39.pyc"
    1⤵
    • Modifies registry class
    PID:4424
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads