Overview
overview
10Static
static
3Vedani-Cry...er.zip
windows7-x64
1Vedani-Cry...er.zip
windows10-2004-x64
1Vedani-Cry...ICENSE
windows7-x64
1Vedani-Cry...ICENSE
windows10-2004-x64
1Vedani-Cry...DME.md
windows7-x64
3Vedani-Cry...DME.md
windows10-2004-x64
3Vedani-Cry...al.mp4
windows7-x64
1Vedani-Cry...al.mp4
windows10-2004-x64
6Vedani-Cry...er.exe
windows7-x64
7Vedani-Cry...er.exe
windows10-2004-x64
10test.pyc
windows7-x64
3test.pyc
windows10-2004-x64
3Vedani-Cry...UI.dll
windows7-x64
1Vedani-Cry...UI.dll
windows10-2004-x64
1Vedani-Cry...on.exe
windows7-x64
9Vedani-Cry...on.exe
windows10-2004-x64
10Vedani-Cry...ce.exe
windows7-x64
1Vedani-Cry...ce.exe
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 14:03
Behavioral task
behavioral1
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/LICENSE
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/LICENSE
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/README.md
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Tutorial.mp4
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Tutorial.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Vedani-Crypter.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Vedani-Crypter.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
test.pyc
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
test.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/XanderUI.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/XanderUI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/obsfucation.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/obsfucation.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/source.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/source.exe
Resource
win10v2004-20240802-en
General
-
Target
test.pyc
-
Size
883B
-
MD5
9829a76c392c1eff6118cfa867a59740
-
SHA1
dda3868565de67012f306ea550a26bcdc440126c
-
SHA256
cad358179be1bc7745ee7cb2fea6f0131d3f7ef7ec1df7767379e1fffbd1e629
-
SHA512
3580bc1618967038c6527c8d17713240a6e34cf2f1382a1e1f756b1bc0595d7d90847677d3c0cd90358588aa6bbc56e871a57ca5bbbe725d2dade8e50c0fb499
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2764 2748 cmd.exe 31 PID 2748 wrote to memory of 2764 2748 cmd.exe 31 PID 2748 wrote to memory of 2764 2748 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\test.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\test.pyc2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2764
-