Analysis
-
max time kernel
436s -
max time network
438s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
27-01-2025 15:54
Static task
static1
Behavioral task
behavioral1
Sample
Main (1).lua
Resource
win10v2004-20241007-en
windows10-2004-x64
29 signatures
900 seconds
Behavioral task
behavioral2
Sample
Main (1).lua
Resource
win10ltsc2021-20250113-en
windows10-ltsc 2021-x64
3 signatures
900 seconds
Behavioral task
behavioral3
Sample
Main (1).lua
Resource
win11-20241007-en
windows11-21h2-x64
3 signatures
900 seconds
General
-
Target
Main (1).lua
-
Size
354B
-
MD5
865f8163347ffdcc10d9bd9d80b586eb
-
SHA1
a7bcd3a55d45a6cdd4d0cca5b185a41baca3cdc2
-
SHA256
d55d493a2557246903f0faad635df8f6d286589a037c6e6cb467a3f67d584d26
-
SHA512
535de35dbb763c10d328bc3fc673ed7bfa672e29edbf5380adc3e34585dab5295a795f6594cfcee88201a0e9f55f1eca4c611842b8a7eaad4a57ad4f7dc1153e
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3454535599-122122096-1812617400-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4268 OpenWith.exe