Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 13:26
Behavioral task
behavioral1
Sample
dx9ware.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dx9ware.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
main/loader.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
main/loader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
X8��%~l.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
X8��%~l.pyc
Resource
win10v2004-20240802-en
General
-
Target
dx9ware.rar
-
Size
6.7MB
-
MD5
446744abf8d06353c59776b59637b749
-
SHA1
acec5264eccf1fe965a06a42b7b83cf23a00b9dc
-
SHA256
12875ace11516e11024c731c544e9c2ec0927394d74f58ff2a7508697509038a
-
SHA512
fd966c375386d92bfad5d84a282bcfb9b48d02fa2b13ac1f39c8110e1785210cb0f0e460c908bd570da9ff93bb5a500c24e1d7de94fe445f74d2def6eaa70c9d
-
SSDEEP
196608:R42B38106nt1kHM6FuFwU/ZAMv5xp/16et:R42d6xks6FHyH6k
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3864 OpenWith.exe