Analysis
-
max time kernel
111s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 16:56
Behavioral task
behavioral1
Sample
meow (1).rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
meow (1).rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
meow/main.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
meow/main.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
main.pyc
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
main.pyc
Resource
win10v2004-20241007-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
8088b742bfde81fa92397ae7d6f43dfc
-
SHA1
0ff23f1343d09f897420293547ba7fdb895d4931
-
SHA256
0cdadc292989f25e5e13780df9f97fd2b385b64e5850c9409aa2cfc5ab4c6587
-
SHA512
8deb7c772998c02e980db279c8c32c729cdd923f11c5de4ecb79aafba6c17d0e8d23f676e64f360773ccba9404b3b787830262b793850d441d8be0197e46b924
-
SSDEEP
192:wGYSOPSJNEFgCD8pBLWdXweuJY37zu72KJhw/ciMdwCz2nw:iSKSY4Wueu2+7x2kiPg2w
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid Process 2692 OpenWith.exe