Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-10-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
BypassApp.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
BypassApp/BypassApp.deps.json
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
BypassApp/BypassApp.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
BypassApp/BypassApp.dll.config
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
BypassApp/BypassApp.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
BypassApp/BypassApp.pdb
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
BypassApp/BypassApp.runtimeconfig.json
Resource
win11-20241007-en
General
-
Target
BypassApp/BypassApp.pdb
-
Size
13KB
-
MD5
5993258e9f8208a02c2af9a90c5932c1
-
SHA1
defd14175020dbb16bc05d6a70d452a88d9e0b52
-
SHA256
e921e6c82c2da6ece4eef382f5818dae4f007751d697cda744b2584933d69c89
-
SHA512
88a8cfd185143e82fbf360797859f080b559d73324f433929908b6e89338315a431945cc1f25443dc39cd5800c1ad126c321759f2de214994102833980954c95
-
SSDEEP
384:ybsq1cV/Nac4JxApaIxZvLbY9jGQ0Nbd7R3osWdXgZcBCNoH7fpxnxvvQOTWrkhC:nq1cx6p30rFW2YTWrkvQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3376 OpenWith.exe