Overview
overview
10Static
static
10empyrean-m...ld.bat
windows10-2004-x64
1empyrean-m...ain.py
windows10-2004-x64
3empyrean-m...ild.py
windows10-2004-x64
3empyrean-m...fig.py
windows10-2004-x64
3empyrean-m...env.py
windows10-2004-x64
3empyrean-m...ate.py
windows10-2004-x64
3empyrean-m...fig.py
windows10-2004-x64
3empyrean-m...on.bat
windows10-2004-x64
8empyrean-m...bug.py
windows10-2004-x64
3empyrean-m...ers.py
windows10-2004-x64
3empyrean-m...ken.py
windows10-2004-x64
3empyrean-m...ion.py
windows10-2004-x64
3empyrean-m...tup.py
windows10-2004-x64
3empyrean-m...nfo.py
windows10-2004-x64
3empyrean-m...fig.py
windows10-2004-x64
3empyrean-m...ain.py
windows10-2004-x64
3Analysis
-
max time kernel
594s -
max time network
600s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 21:06
Behavioral task
behavioral1
Sample
empyrean-main/build.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
empyrean-main/builder/main.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
empyrean-main/builder/util/build.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
empyrean-main/builder/util/config.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
empyrean-main/builder/util/makeenv.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
empyrean-main/builder/util/obfuscate.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
empyrean-main/builder/util/writeconfig.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
empyrean-main/install_python.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
empyrean-main/src/components/antidebug.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
empyrean-main/src/components/browsers.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
empyrean-main/src/components/discordtoken.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
empyrean-main/src/components/injection.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
empyrean-main/src/components/startup.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
empyrean-main/src/components/systeminfo.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
empyrean-main/src/config.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
empyrean-main/src/main.py
Resource
win10v2004-20240802-en
General
-
Target
empyrean-main/src/components/browsers.py
-
Size
11KB
-
MD5
720067bf62202ab20bd0bdce2404b294
-
SHA1
7c60970fd79957309b84b4265671ee7ebe7161c0
-
SHA256
38ddcdaa3f2ac2bbac94d7b34cc708449aec108fd2065f3555053e8916544b77
-
SHA512
20f10bd12ecac1f3197b7611a4911ce7f232a16432b465bc5346dd1e5c288de56042c6144104d54bc2ee53acc0bf9c98d2baf972a4b4b9aa9ce655080462f0e8
-
SSDEEP
192:Yo1etBr/e8k03E5YYul25ZXIbHYsq5w/wVbPRfwmbd5NcbtU03vbt2w79G+R5:gzEhFsq5w/wPfwCN903Uw73R5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3128 OpenWith.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
pid Process 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe 3128 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\empyrean-main\src\components\browsers.py1⤵
- Modifies registry class
PID:4252
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4152,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=4200 /prefetch:81⤵PID:1564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3892,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=3816 /prefetch:81⤵PID:4848