Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24-08-2024 21:37
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
misc.pyc
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
source_prepared.pyc
Resource
win10-20240611-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win10v2004-20240802-en
General
-
Target
misc.pyc
-
Size
4KB
-
MD5
3af0657bf4d2cdcd8e84aeee71be06f7
-
SHA1
bd28a025931e96da24c9818e1a1648d2ce7f5212
-
SHA256
83bbb656424fab009b612232bab4970a8bd49c944285975babb3de8f99db9da6
-
SHA512
a402b759e427ed78e55650b9188772916787a1734f5dd5a5782d98228c7c9da11057627bcad29aa94139a9c20b1c4ca2e8c92983b38384245855f6da3369dace
-
SSDEEP
96:ySMlhlvyz7DweHPF8+VB7sHIZGQSWfvmyyZ1k9qHub:Lolvyzgevq+VBXZGQlvmV1kkHub
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3980 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3836 OpenWith.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe 3836 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3836 wrote to memory of 3980 3836 OpenWith.exe 75 PID 3836 wrote to memory of 3980 3836 OpenWith.exe 75
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc1⤵
- Modifies registry class
PID:3328
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\misc.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:3980
-