Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
Klick the button/Server.py
Resource
win10v2004-20240802-en
windows10-2004-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Klick the button/klick_the_button.py
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Klick the button/Server.py
-
Size
2KB
-
MD5
de02844852617a1a5167e1ed49f00868
-
SHA1
2bb44630cc650143040948c99736fd9e9c7694cc
-
SHA256
626ed538b1f6688b61981accb581a76b7b9823bbe8889be7bf9d9de7b2a6a45b
-
SHA512
122223157c2d986c989bb741dc752dedf9e477c093fc804593ba6840ed62ec5e221395b6aabf60ffcb6d7b737b2dac0e03d2a0015ff1c52517c81d96c1deb207
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4256 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe 4256 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Klick the button\Server.py"1⤵
- Modifies registry class
PID:528
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4256