Analysis

  • max time kernel
    133s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-10-2024 17:07

General

  • Target

    IDA Pro 8.3 (x86, x86_64) additional by QiuChenly/plugins/WPeChatGPT.py

  • Size

    32KB

  • MD5

    5322e7cae891b9b75ec421d9e7d19e38

  • SHA1

    b09801aa2ce358d90af32505e8e28bc35e372ee9

  • SHA256

    96f04bbae3c5c50adb823727635485f8b89d8161efabf9533b19f831aa494881

  • SHA512

    a763c73f902710402e336c3ac08fe45a6d4a82d4a8b6a113072e7519ca8689a756a4e736fd7a819e48cc9ec0e212a129e321e9754896ef3b419062107af28545

  • SSDEEP

    768:gZkjH7dQjpN2yWtIqEcUqs8MDY6RzbLTp7w:gZQHhQ1N2yWtIqEcUq0zbLTp7w

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\IDA Pro 8.3 (x86, x86_64) additional by QiuChenly\plugins\WPeChatGPT.py"
    1⤵
    • Modifies registry class
    PID:4444
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:316
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:216

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads