Analysis

  • max time kernel
    85s
  • max time network
    95s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27/09/2024, 12:58

General

  • Target

    data/python-3.12.5-embed-amd64/Lib/site-packages/cryptography/hazmat/primitives/__pycache__/__init__.cpython-312.pyc

  • Size

    256B

  • MD5

    5d99b612c5825536f0ab1476e663bc9a

  • SHA1

    1182e81fa754688889b9d0a0bf6f369642429c63

  • SHA256

    f297a8cea7d22061a77661fb8361b48f2b8e4205ce4ccb38c528f09b9732dcd4

  • SHA512

    bfae7d5613c69f3bd4b81d938bb72d1a54b1cf6dd2534f6cd0fd009633fa0b5584d0cee2a22203c7a87ec5129662c48d73f2b164bcea5da51babcb051b16236a

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\data\python-3.12.5-embed-amd64\Lib\site-packages\cryptography\hazmat\primitives\__pycache__\__init__.cpython-312.pyc
    1⤵
    • Modifies registry class
    PID:2812
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads