Overview
overview
10Static
static
39b00715d77...4e.zip
windows10-1703-x64
19b00715d77...4e.exe
windows10-1703-x64
10$PLUGINSDI...em.dll
windows10-1703-x64
3Bagpaa.mon
windows10-1703-x64
3Condign.str
windows10-1703-x64
3alsmekill.sta
windows10-1703-x64
3boat.ast
windows10-1703-x64
3rupis.txt
windows10-1703-x64
1Analysis
-
max time kernel
132s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08-10-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
9b00715d77438200a4f54fa8f47ac17aab0cc166e95fc6737c2a78021b69a64e.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
9b00715d77438200a4f54fa8f47ac17aab0cc166e95fc6737c2a78021b69a64e.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Bagpaa.mon
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
Condign.str
Resource
win10-20240611-en
Behavioral task
behavioral6
Sample
alsmekill.sta
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
boat.ast
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
rupis.txt
Resource
win10-20240404-en
General
-
Target
alsmekill.sta
-
Size
331KB
-
MD5
f6a8488b1b62b7ac3b0979c8fbeabb30
-
SHA1
9725896ebc26ccb2cb9060640b9e0d4a0618916f
-
SHA256
34dc9b70d0ce5223a531e499611f1208f3ae85aaef9973fc27e89190568f8ee2
-
SHA512
88a719685d0972290632c6b5a665184e79a98be22b76af28f18056f2e7a721a0b2d3b4a8815bce562426643e69f998f9e45f3ca62b3288eaafb71fe89a23ad20
-
SSDEEP
1536:JwpZQcXbJ+mf8ME8s+dg5Z90uGaXF9Pl7:W4cX8ncmxhGm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4220 OpenWith.exe