Analysis

  • max time kernel
    92s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2024, 10:25

General

  • Target

    Vespy-Grabber-main/utils/ErrorMSG.py

  • Size

    137B

  • MD5

    22ea9218d64458342d6c165a6dc79c06

  • SHA1

    930c6ff6c40f047086d1818ca33d21d9b8f3e61f

  • SHA256

    1b63f85aaf82266725c23e97b7850ef12956cc94ab00fb9a12a534d282c0c8c1

  • SHA512

    d21bf0951338f9276bd87d6fb23e702cc9b600227b737cddc9ea57c0c191c6d95e52b38b459b0bc0b987da81a548ff4e6fec19eae73993417b161c14d8a05331

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Vespy-Grabber-main\utils\ErrorMSG.py
    1⤵
    • Modifies registry class
    PID:2012
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4356

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads