Analysis
-
max time kernel
214s -
max time network
317s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-11-2024 22:37
Behavioral task
behavioral1
Sample
exhisa .exe
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
13 signatures
300 seconds
Behavioral task
behavioral2
Sample
exhisa .exe
Resource
win11-20241023-en
windows11-21h2-x64
13 signatures
300 seconds
Behavioral task
behavioral3
Sample
main.pyc
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
7 signatures
300 seconds
Behavioral task
behavioral4
Sample
main.pyc
Resource
win11-20241007-en
windows11-21h2-x64
4 signatures
300 seconds
General
-
Target
main.pyc
-
Size
1KB
-
MD5
1c65418e7a672e3c175033085cf5bc3f
-
SHA1
b21cb50dfcf93782bd7636dcb42b0206366b1935
-
SHA256
97d54fdfb92d4106f6301566e9121b9a3a277e88dffeffb0ad2f695e59106cae
-
SHA512
6fd7fcd7e0a70f1b399cf5942e535b16833907d1459ca604a2fca1da1c5a4b755302bcfed6cf0d813dcf27748023d67b84e18c35e15353ff9d28855e6c58a23c
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 4444 OpenWith.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
Processes:
OpenWith.exepid process 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Modifies registry class
PID:1920
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4444