Analysis

  • max time kernel
    67s
  • max time network
    93s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-10-2024 01:01

General

  • Target

    modules/urh-master/tests/test_csv_import_dialog.py

  • Size

    4KB

  • MD5

    a1295a0ae47fe80774c974c3fbc3d72b

  • SHA1

    8159e7451d811ad85dbc0e824538e641666797a8

  • SHA256

    5d5115ca24b5b4f245831953f55881b64ffb77cefa115508998c5fc2ef4cddbc

  • SHA512

    5e92513293d267cda734dec2ff6672297de821f9ea57fee3c1bf500b279f032c49aa46717e668266cba9a6f580eca02c0f6a05a94813a49c3e8d98dd041ce506

  • SSDEEP

    96:tHucTcS1fcAK0rh1w3ZORt96BSuVFBe5mINdia4z3Z0PYl3/bjLEB9eCmgUgb:0cTcS1fcAK0rh1wJORt9m7VFENdi1J0X

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\modules\urh-master\tests\test_csv_import_dialog.py
    1⤵
    • Modifies registry class
    PID:4248
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads