Analysis

  • max time kernel
    437s
  • max time network
    438s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/08/2024, 15:50

General

  • Target

    ma.py

  • Size

    446KB

  • MD5

    71faba4b77f6af8ee72146790f247d2a

  • SHA1

    f085cc99dc537fc29ee8deefc67b4aa202378a01

  • SHA256

    348795404034488c3ff8cce761ce69bf870556b779b8dc469a0f9312faf6dcca

  • SHA512

    3401f3ccc5fe4edd80be4d7d4674470060018dce490d34c72d0527db067e10f39d42754cafa81143033c088880ed931cb9778887c36e0953ea63d8207a5e663f

  • SSDEEP

    12288:0u6l467ZpC7zWfxRduGsarSZiPD10QryTsIWOi:LNOr9/umqiPBMXi

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ma.py
    1⤵
      PID:4528
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4040
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5060

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

      Filesize

      10KB

      MD5

      a7f391566ceb7d310b04c1376aa66a07

      SHA1

      eda88e9134d3de209152481c9e8aa02054d4c2eb

      SHA256

      8ecb81fa22792fa6bb09abc86b9b5afb50773e2c5537def45dd8ba297f6c714e

      SHA512

      163bad20eaa9108286367367e6a54a9ac612026954ee2466b8f88f732a992695fe160d3fb5f092976ef15c1c1b71400e577a9a4833dfa616d7c9ee6a8237033c