Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
cstealer.py
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
cstealer.py
Resource
win10v2004-20240802-en
3 signatures
150 seconds
General
-
Target
cstealer.py
-
Size
55KB
-
MD5
ea43e227bb696283c4f8264bddf812c9
-
SHA1
79ac2cbb09ca0171d52c1e354bdbc9f95b7c52a6
-
SHA256
cc908724a3f6d6b06f3a270c4fbb8d0a3d338d70b6d4c8c79f4d9b3e3ee959dc
-
SHA512
59b7c24f1cf807d5377f02f117961e33136e0c381181043685445d9c81dec31d3c0ec4fe5af9ad02c74b90a8e80fa75ffe9794813d4e49e91e3e1845aca8c3f4
-
SSDEEP
1536:dTjwFKWAs8SMApj48b9tTLCKDJ3bN1GTI6+B:djswKj48b9lLvJ33GTY
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 980 OpenWith.exe