Resubmissions
21-10-2024 17:16
241021-vs5t5a1fpp 1021-10-2024 16:10
241021-tmhxqsydqd 1021-10-2024 16:06
241021-tkatcazhrk 10Analysis
-
max time kernel
1375s -
max time network
1161s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 16:10
Behavioral task
behavioral1
Sample
Compiled.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Compiled.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20241007-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
09518663caeda063776f6737284938e1
-
SHA1
1b492e1c4880a509350c706678ea606ff6d2ece0
-
SHA256
715c625cc1b148e504cccc4b354621b9b32697eeff344247d52ef02339dfb0e6
-
SHA512
05bd58a5a7d9aa42d3643ce3e5179991634ae110eab54bc3ec68e6df346560e05802f9e46b28c5e040b7212903d9ce242606e875f27070517bcc2e5554757dda
-
SSDEEP
192:wvP7VirD8fiVYWdXwk4YSk2kJhwjyyJ6PMdw3+7nw:8PJNBWukNSX42jy7Pyw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4308 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 960 OpenWith.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe 960 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 960 wrote to memory of 4308 960 OpenWith.exe 102 PID 960 wrote to memory of 4308 960 OpenWith.exe 102
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Modifies registry class
PID:1240
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:4308
-