Analysis

  • max time kernel
    146s
  • max time network
    272s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    30-11-2024 11:26

General

  • Target

    Grabbers-Deobfuscator-main/a.exe_extracted/PYZ-00.pyz_extracted/PIL/ImImagePlugin.pyc

  • Size

    6KB

  • MD5

    0eff708317491f2a81b9750e099aa880

  • SHA1

    0b78aa0aa2f8dabfd7453f06a7d8606beb4c00f1

  • SHA256

    82bc10c473f589cbc998c1e851b0c35f83f2479b987ce43ea1ffd8a4f594a9e2

  • SHA512

    09e5824086ce6aad09a2d13a1c25774c571c77fdf8aaebc80e8a005446889af4b8492b9dd8fc9b7917e8b3860c382fb2ca9622f84f30297bf0d16aa95e46cff6

  • SSDEEP

    192:HcmnTcArYXpwtwEZctwXeq1z2XfU8BoyyG:HlrYZwmEZctYvPW

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Grabbers-Deobfuscator-main\a.exe_extracted\PYZ-00.pyz_extracted\PIL\ImImagePlugin.pyc
    1⤵
    • Modifies registry class
    PID:1628
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads