Analysis

  • max time kernel
    108s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    11/01/2023, 15:58

General

  • Target

    App.java

  • Size

    5KB

  • MD5

    7864957300204a51c450ac825c9acfeb

  • SHA1

    00760ad35c7d6d509c31d19edf78afd98b2605b8

  • SHA256

    88cbb0609a53ef38bd0320077b27598a219224d4a22febcb2aab37e18be1203a

  • SHA512

    b49ae0c6fcf3aa4e3a4daddffb0083e1a5ed385ce4ca19c5c5ab8d9c2d35a8350c10c55d8d61f625b6bb54a69ec48766a19d0b80583a3f0887a89529f9fb079d

  • SSDEEP

    96:9OeTYVnNr9MwWk/yZ0rCwPu0CfMs7cir8OVCKm5C9zisLCfJ+fCUUDDO:0y3wWLjcu8OVCh5C99LCIfCUUDDO

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\App.java
    1⤵
    • Modifies registry class
    PID:4316
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads