Analysis

  • max time kernel
    131s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-10-2024 10:25

General

  • Target

    Vespy-Grabber-main/utils/AntiDebug.py

  • Size

    10KB

  • MD5

    42dbc47eb925a4fc8c0cf8f0531caf7c

  • SHA1

    ff1c603f2d1d080bcf70f61d67da82f9f0525939

  • SHA256

    dcfcd42d926614e340f8b9b5a7584f50766df303f1ae37fac9d84d285a3e01c2

  • SHA512

    647f959dc1f88db000e00da947e501b3f458103b44a3d8c6d401a02f30bcba64ddd006cbea5d912b9d0a518a2f3707100c75ef83e3ac39ae50cebf9a0fdb1e43

  • SSDEEP

    192:8XkKV83Gsn8ZBwh9uYmypzrKU8zr7xa8J9sF0ytgBWLSHa1rf7Rk:8Pd+nuYJzrn+r9RJGJWWLSHa1rfa

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Vespy-Grabber-main\utils\AntiDebug.py
    1⤵
    • Modifies registry class
    PID:3296
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads