Resubmissions
25-09-2024 13:28
240925-qq3jrs1dja 1024-09-2024 20:51
240924-zm82taxhle 1024-09-2024 19:21
240924-x2m2sazhql 1024-09-2024 19:17
240924-xzhpaazgpj 1024-09-2024 18:11
240924-wsp94sxcnp 1024-09-2024 17:54
240924-whcahawgjr 10Analysis
-
max time kernel
535s -
max time network
438s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 19:21
Behavioral task
behavioral1
Sample
Anarchy Panel 4.7.7z
Resource
win10v2004-20240910-en
Behavioral task
behavioral2
Sample
Anarchy Panel.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Anarchy Panel.exe.xml
Resource
win10v2004-20240802-en
General
-
Target
Anarchy Panel 4.7.7z
-
Size
52.3MB
-
MD5
40fa4dfb75a2ff3595435c374a5f5e68
-
SHA1
2086fd6c2f38fb20e87a50cf3ee27dfb68fa3843
-
SHA256
bf9aa6957a814d551d3ba7f96690ff76c79ff884718b3a0f16ab17b96c2637ff
-
SHA512
a0655a97428c2a1981015c7b819a207d119b82fe88242f8a0e703adf3eedd386de73412e428dfce1fcedacbbb04ff23775c66e21584f27b5065ed32f510da3de
-
SSDEEP
1572864:AN5bnkUpaR1Ju0aVJfQF593gMr8okmaHY5q2iSBHxhj3lF:Q5bkxbJOJfnMYoriIRhX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 3972 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
Processes:
OpenWith.exepid process 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe 3972 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
OpenWith.exedescription pid process target process PID 3972 wrote to memory of 2628 3972 OpenWith.exe NOTEPAD.EXE PID 3972 wrote to memory of 2628 3972 OpenWith.exe NOTEPAD.EXE
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Anarchy Panel 4.7.7z"1⤵
- Modifies registry class
PID:3912
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Anarchy Panel 4.7.7z2⤵PID:2628
-