Analysis
-
max time kernel
92s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 16:37
Behavioral task
behavioral1
Sample
TeddyPcFiles.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
TeddyPcFiles/Teddy PC (main).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
TeddyPcApiRequests.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
TeddyPcFiles/config.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
TeddyPcFiles/saved_account_db.json
Resource
win10v2004-20241007-en
General
-
Target
main.pyc
-
Size
27KB
-
MD5
9195f42fefa8c0f8cdec4ee4e8d870aa
-
SHA1
c84cf90b7ef42e4b814ffb0f03476f9f3993dbf5
-
SHA256
6c1ef9685c76436b4d35dd5b668e0805bf391a1b16fe4362afd2bb08d2fb1d31
-
SHA512
c755a059b4294f7ace23130c86d99a25ebf112bbda0f3781f8b318bd916dc1ddd2ab4db976b3c2bda800379f0c404c798776426df4a158f1d1bfe3c9c8f9a674
-
SSDEEP
768:nF6TJQLaysq7hs2jap2H517VcVfngif+RX8:n2yLays/0H7koiWRM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3288 OpenWith.exe