Analysis

  • max time kernel
    91s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    30-11-2024 11:26

General

  • Target

    Grabbers-Deobfuscator-main/a.exe_extracted/PYZ-00.pyz_extracted/PIL/FtexImagePlugin.pyc

  • Size

    3KB

  • MD5

    16e845948fa565012d63a83ad88d728e

  • SHA1

    3354c6026a87c591a7256d77c8f77abcc5170e6c

  • SHA256

    f1314939d75b275da30392f1550b733cadc7bda57b4e00f5b5d6a710229c3e2e

  • SHA512

    cfbe53b45c2c289c9c9c4ff095eecf264a4798ff08aa4735c4b18d4a4bd704e5963bf9d168aa8164279ec5273ff60666ff685aa962c4ef05f8b67db31d56c6e3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Grabbers-Deobfuscator-main\a.exe_extracted\PYZ-00.pyz_extracted\PIL\FtexImagePlugin.pyc
    1⤵
    • Modifies registry class
    PID:1536
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads