Analysis

  • max time kernel
    103s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 22:06

General

  • Target

    Zenny.py

  • Size

    25KB

  • MD5

    3e727835e89ea25614e6d4d5ce716832

  • SHA1

    cfed65dbe00db23fffaadf073ff8274cd79a1775

  • SHA256

    0af533717161fff8853f0479bde568681acab0161494dd202cf8321cbea25630

  • SHA512

    42fbc09fed3afb889fbb964d80861873391b6ce2abd122be197705425de7ff375692c787fe969d972aed5370e82fc0c4dd2700edf51ab225544e697c5a38cb08

  • SSDEEP

    384:QBo0Q+KxVTxHY4euYHtFH5Z9xMrD4ds1y:QBo0Q5xVTxHauWtFvv4DGs1y

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Zenny.py
    1⤵
    • Modifies registry class
    PID:3516
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2548

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads