Resubmissions
11/03/2025, 01:41
250311-b4hzyswlx2 10Analysis
-
max time kernel
111s -
max time network
146s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11/03/2025, 01:41
Behavioral task
behavioral1
Sample
VMX Spoofer.exe
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral5
Sample
passwords_grabber.pyc
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win10ltsc2021-20250217-en
General
-
Target
source_prepared.pyc
-
Size
171KB
-
MD5
7e1927afc400d2d7290c5f3450f8ad90
-
SHA1
fe682567a4419614d3daeb7fea3c4ba362ec853a
-
SHA256
a4b1cc04e4e4e7189d3ae3854ea5e659c1d231f364bc03ad0648c1195e6e40b0
-
SHA512
ffda2edd88998c601218e310d63494a8f4d869e23af29fb4b6d505c7bafdd8130152120ccff4059dc1bfff5b656d7ab17a256303d3db581684941f66f76c21d2
-
SSDEEP
3072:N5UawF05YGl3S2SVfUFoGoD7iD6GxrhQpvqda+oqXsilDY:NE65hlrSNGo6r6Jqda+1sKY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3996797005-1442104920-3698332314-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3996797005-1442104920-3698332314-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 432 OpenWith.exe