Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2025, 17:52
Behavioral task
behavioral1
Sample
Exela.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Exela.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20250314-en
General
-
Target
Stub.pyc
-
Size
874KB
-
MD5
1878429e557ab3b7c40255159873a138
-
SHA1
424cf7f25e131cc063b25d5f7705732166b4d8b0
-
SHA256
d4d6821b1df9f5640fb71ae5690affa44999f2cec7d2fe2a79100670b9a33e5c
-
SHA512
e3731625096cacf35f08b4d5d3c5434cb11693c250515e7b8469ce0e0afface44801d4219d27c9e6e6b0ffe32901ca7aeb6660091a924d9fc27f9809d8bbb918
-
SSDEEP
12288:sqQYfO1BuUy5b16GHBkj6WhSV/4+WTsa7Oz6gMSaATWX4pzMVHDWFNh+:sqQYOuUy6GtVg9OzNxVpAoFNh+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 180 OpenWith.exe