Analysis
-
max time kernel
101s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
Factura (8).tar.lz
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Factura (8).tar.lz
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
sample.tar
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
sample.tar
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Factura.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Factura.exe
Resource
win10v2004-20240802-en
General
-
Target
Factura (8).tar.lz
-
Size
588KB
-
MD5
53baf5c9a0c8b13cb0bbdca4cd7cc025
-
SHA1
3bd3e1996c64620f83a64c826708c33beedcc14f
-
SHA256
207470c31aebb98487d019c4ca219f77be687bca6c704321066f6b6f31c58d25
-
SHA512
d712c8d8536555fe420b3a1851c73c8ece0c9dcbf9c583b8a003c76a05392828a8dc9b41bc35443bbdec9a7346df5d5d495c8a839a9c6d4941cdcf051c584068
-
SSDEEP
12288:Ur52lfmBF12lYaKdlfquhYKJReshs1UsG+16h3O9Mu74Cn8pTm/uxwUbfDp3/:NNGFLL3fqMR1hs1Usu3XsZ8pT7NbfF3/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3292 OpenWith.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe 3292 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3292 wrote to memory of 1616 3292 OpenWith.exe 97 PID 3292 wrote to memory of 1616 3292 OpenWith.exe 97
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Factura (8).tar.lz"1⤵
- Modifies registry class
PID:244
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Factura (8).tar.lz2⤵PID:1616
-