Analysis
-
max time kernel
93s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
astro pass 1.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
astro pass 1.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
password 1.txt
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
password 1.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
пароль 1.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
пароль 1.txt
Resource
win10v2004-20240802-en
General
-
Target
astro pass 1.rar
-
Size
12.4MB
-
MD5
dfb5a5ef9fe9d09ae521fec5e2f54ecf
-
SHA1
689ea335575a8312d6091eb99f5afa3f4bc01880
-
SHA256
baa33659646ea9a4d713d5046233a631587a399099cfc45a55439332e1675de1
-
SHA512
319fce64195387e1fda76e35febf8c246fa3d0da36e8fd64145bd8b50dbc9e28ff200d71e776edf0cd5fdfc13930fbf82d1b407ea08e3dcd647b4f1fdda0c768
-
SSDEEP
393216:p2Qomebw7KckTX47nWgUdrKPKQrt2SBoRVIWSUE+ehBiNPfdUQXvKV:sQopkKcg47WgoBQrtnORVI3UE+e8pv2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 864 OpenWith.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe 864 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 864 wrote to memory of 2824 864 OpenWith.exe 91 PID 864 wrote to memory of 2824 864 OpenWith.exe 91
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\astro pass 1.rar"1⤵
- Modifies registry class
PID:3516
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\astro pass 1.rar2⤵PID:2824
-