Overview
overview
3Static
static
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3.git/hooks...sample
windows11-21h2-x64
3modules/ur...ion.py
windows11-21h2-x64
3modules/ur...log.py
windows11-21h2-x64
3modules/ur...gui.py
windows11-21h2-x64
3modules/ur...ons.py
windows11-21h2-x64
3modules/ur...ing.py
windows11-21h2-x64
3modules/ur...tor.py
windows11-21h2-x64
3modules/ur...ter.py
windows11-21h2-x64
3modules/ur...log.py
windows11-21h2-x64
3modules/ur...log.py
windows11-21h2-x64
3modules/ur...ile.py
windows11-21h2-x64
3modules/ur...tor.py
windows11-21h2-x64
3output/Dia...tif.js
windows11-21h2-x64
3output/Dia...n__.js
windows11-21h2-x64
3output/Dia...ket.js
windows11-21h2-x64
3output/Dia...eg.vbs
windows11-21h2-x64
1output/Dia...ins.js
windows11-21h2-x64
3output/Dia...ter.js
windows11-21h2-x64
3output/Dia...ock.js
windows11-21h2-x64
3output/Dia...ins.js
windows11-21h2-x64
3Analysis
-
max time kernel
69s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-10-2024 01:01
Behavioral task
behavioral1
Sample
.git/hooks/applypatch-msg.sample
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
.git/hooks/commit-msg.sample
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
.git/hooks/fsmonitor-watchman.sample
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
.git/hooks/post-update.sample
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
.git/hooks/pre-applypatch.sample
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
.git/hooks/pre-commit.sample
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
.git/hooks/pre-merge-commit.sample
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
.git/hooks/pre-push.sample
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
.git/hooks/pre-rebase.sample
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
.git/hooks/pre-receive.sample
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
.git/hooks/prepare-commit-msg.sample
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
.git/hooks/push-to-checkout.sample
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
.git/hooks/update.sample
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
modules/urh-master/tests/test_crc_gui_integration.py
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
modules/urh-master/tests/test_csv_import_dialog.py
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
modules/urh-master/tests/test_decoding_gui.py
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
modules/urh-master/tests/test_demodulations.py
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
modules/urh-master/tests/test_encoding.py
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
modules/urh-master/tests/test_file_operator.py
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
modules/urh-master/tests/test_filter.py
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
modules/urh-master/tests/test_filter_bandwidth_dialog.py
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
modules/urh-master/tests/test_fuzzing_dialog.py
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
modules/urh-master/tests/test_fuzzing_profile.py
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
modules/urh-master/tests/test_generator.py
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
output/DiamondSorter/_internal/jedi/third_party/django-stubs/django-stubs/template/smartif.js
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
output/DiamondSorter/_internal/jedi/third_party/typeshed/stdlib/2/__builtin__.js
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
output/DiamondSorter/_internal/jedi/third_party/typeshed/stdlib/2/_socket.js
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
output/DiamondSorter/_internal/jedi/third_party/typeshed/stdlib/2/_winreg.vbs
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
output/DiamondSorter/_internal/jedi/third_party/typeshed/stdlib/2/builtins.js
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
output/DiamondSorter/_internal/jedi/third_party/typeshed/stdlib/3/_tkinter.js
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
output/DiamondSorter/_internal/jedi/third_party/typeshed/stdlib/3/asyncio/trsock.js
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
output/DiamondSorter/_internal/jedi/third_party/typeshed/stdlib/3/builtins.js
Resource
win11-20240802-en
General
-
Target
modules/urh-master/tests/test_fuzzing_dialog.py
-
Size
8KB
-
MD5
26369bbbe8cc2a299626a33e68d2e438
-
SHA1
020f164c3c434663c5e233e9eb77147ae4a3eb38
-
SHA256
d915f799daff321da05818d65b9ce40b114d7f5e231729cc67b2483a3ed96af7
-
SHA512
26944eaa29f5143ccd4456a11eaecea63b42ea00c7918e5a05bcaf30edeede129c7ff39c952504f548c2a7c79573fc8d16014ed9c3ce64b6636c57a877db45fa
-
SSDEEP
192:TYGo19+WbsBcD7R8CWcqdTmcqPLHcqBMVZcqgTmcqLLHcq3aj1M11lzLNENek23v:cGm9+ksBAV8CWcqBmcqDHcqWHcqsmcqN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3708 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\modules\urh-master\tests\test_fuzzing_dialog.py1⤵
- Modifies registry class
PID:5104
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3708