Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-10-2024 00:44
Behavioral task
behavioral1
Sample
Kasperipee.exe
Resource
win11-20241007-en
exelastealercollectiondefense_evasiondiscoveryevasionpersistenceprivilege_escalationspywarestealerupx
windows11-21h2-x64
28 signatures
600 seconds
Behavioral task
behavioral2
Sample
Stub.pyc
Resource
win11-20241007-en
windows11-21h2-x64
3 signatures
600 seconds
General
-
Target
Stub.pyc
-
Size
875KB
-
MD5
55ef6fcb823e4b55336c919f54c2008f
-
SHA1
7650b903b4097f99f2ad60140576ba89d42fb06f
-
SHA256
bc79b1df842cf42628d9cd0a0ea6afc50c01041ecede898410b6c884a4fde429
-
SHA512
b0e74e4c1534649d12f20363d7b0426ab55677af9b0219178e0c82f39177487d07c27c1c4affd50cd16def695b6504b9e63a7fc582bf5aab2e23952778124639
-
SSDEEP
24576:LxkOR7XHa5D7fddTsOHnNBplux1xDvSTcP:9k27XH8TFhCDDSTcP
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4616 OpenWith.exe