Analysis
-
max time kernel
5s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/09/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
system32delete.py
Resource
win11-20240802-en
4 signatures
150 seconds
General
-
Target
system32delete.py
-
Size
845B
-
MD5
60c97cc4ff9211ea986541152fa3bdb4
-
SHA1
f208de4d68da979289308d470256721eee6e9814
-
SHA256
68d4145a6ed01a63edf24a645e78df745ecd3402eb999590377e61ea23a378b1
-
SHA512
a030289355703383889bda9564de7eca721d026e69363fefb58ba2d9b8b0b537da77401fc3030c363273ae497ea87138a3eb7a573ae95841d7402dd20aa57498
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4864 OpenWith.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe 4864 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\system32delete.py1⤵
- Modifies registry class
PID:772
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4864