Analysis
-
max time kernel
430s -
max time network
431s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
20-12-2024 17:16
Behavioral task
behavioral1
Sample
Senex-paid-UPDATED.exe
Resource
win10ltsc2021-20241211-en
exelastealercollectiondefense_evasiondiscoveryevasionpersistenceprivilege_escalationpyinstallerspywarestealerupx
windows10-ltsc 2021-x64
31 signatures
900 seconds
Behavioral task
behavioral2
Sample
Stub.pyc
Resource
win10ltsc2021-20241211-en
windows10-ltsc 2021-x64
5 signatures
900 seconds
General
-
Target
Stub.pyc
-
Size
799KB
-
MD5
4f491a348a821e6aeea2165fed088e61
-
SHA1
9e8f56cf3051d048831863a1062d873f3bdede9f
-
SHA256
a7f0638c056fb677753fefb44ea07b53a6c861593e330cde31e133fc2f23ef9c
-
SHA512
51a17367b09a2592bf2996cb29b8416b6e7363bdaf36934b9835a7b3ced58525c6a3773c7fcc43cd82702f7357d66543666f09d31e7318f8daa427ba9e98f7bd
-
SSDEEP
24576:bgTQUCoDiyPd2403duykvNHzLibie6xVJLUFb:bgTPC8KyNLiWekE
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3100 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3276 wrote to memory of 3100 3276 OpenWith.exe 95 PID 3276 wrote to memory of 3100 3276 OpenWith.exe 95
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Modifies registry class
PID:1688
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Stub.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:3100
-