Resubmissions
02-11-2024 14:06
241102-retcdswkax 10Analysis
-
max time kernel
1371s -
max time network
1159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 14:06
Behavioral task
behavioral1
Sample
source_prepared.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
misc.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
source_prepared.pyc
Resource
win10v2004-20241007-en
General
-
Target
source_prepared.pyc
-
Size
173KB
-
MD5
48357c1da65e8bbc2b4faef6c59cdd2a
-
SHA1
4d2e58801c74acdb80aaa37ca532d409575399a0
-
SHA256
659e2bd2f5e5d6e628caac279fd0d043283f8cd3f74042f069dcf6c4b0cc50d8
-
SHA512
131f4a8f09463471b50ecf0c30a1e9a328a6945c33c175e21a6f3767dbb87b8a14391c21ffbe6a1b52ab656165beac22ffe3e23bb3751f0835cf562e52d797a4
-
SSDEEP
3072:XFfLhk0aOO22A1VSUkosPZTJ0pZyScWaQV+AcwIvdXzFsTWu:X7k0aOO22ApkoHpL9EA+sD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 228 OpenWith.exe