Resubmissions
12-11-2024 03:23
241112-dxl45sxjbk 10Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 03:23
Behavioral task
behavioral1
Sample
Requirements installer.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Requirements installer.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Source Code.py
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Source Code.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
VytrixDuper.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
VytrixDuper.exe
Resource
win10v2004-20241007-en
General
-
Target
Source Code.py
-
Size
6KB
-
MD5
b8aa439871282435fe23e9fc8b982dc6
-
SHA1
3cd1425a62afbd2aa49fc528f4d9fac3d0cae728
-
SHA256
41cb1957be003b597652b9f97ae324366bea9992c2a4ffb88c4346999d54b7df
-
SHA512
ee78ddf1797f4338eb3269b56fa68270efe7a4cc80a234706eef4bc73b14376864513371dd3116f893fc6ac6a8e86c31b0434edd6ca89ba63a75174b5d6a0a55
-
SSDEEP
96:Xw1Tw/hL8s/cjbID/HWas5mNPKJ0GPafXcvwtozyJXgv3+YGMyFmnlsP:Aw/hL8s/cjO/H0mNPw8Xcvkoo4uBwlk
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 900 OpenWith.exe