Analysis

  • max time kernel
    91s
  • max time network
    101s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10/08/2024, 12:54

General

  • Target

    vanish.py

  • Size

    98KB

  • MD5

    33eab8b731bc0eed6f4fd7f3e9ade347

  • SHA1

    31fdee29abb2a864479f6aa8be6951ec5d64c6d1

  • SHA256

    f669dbc5c810b2c502ac7829e0543ffdff2891c02497dd993bef2aa267e670e4

  • SHA512

    411bd39016bea99ad037f0049b5fb148aa90c9309bc4f1ff4d005775276065ee630d1804c1cf9b4d30971bfddd51f34f9bb0b4085a3c14bcc90f7f6826a71f47

  • SSDEEP

    1536:P4UVdoM4/NJnsfBwntLtwcTyVzPraregH/W5RuQXqmWwYCQ3WFWgcK5tDZ2Xw:PnVirFaBwLt/T4mdfW5RuRmWwYZ5w

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\vanish.py
    1⤵
    • Modifies registry class
    PID:3604
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1392

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads