Analysis

  • max time kernel
    50s
  • max time network
    61s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/02/2023, 00:34

General

  • Target

    まりあ [Maria] 純真無垢Part4[IMOG-182][60fps].mkv.torrent

  • Size

    14KB

  • MD5

    544377cce3664d9cf1fa40076d163692

  • SHA1

    80698ed0326a65a6db6e39b3cdaf17a070566baf

  • SHA256

    09bb049cc4eeb25cc5890fe7f776dc76a333bd0da2c1099672508880de547845

  • SHA512

    27d7f5c2d3f166eb55efcbc0208414436c13b343dc8e91c17ca0a20d6fb04448f78c24aab6a9bc4156980cfcaaec3823dd0f5b32ef968ec695cc1ed737de12fd

  • SSDEEP

    384:nhn9nQhjrpbUsCcNZHDSt/amozJVjbKvuRMFbxXrB8:Yh5TrHDmozJVCmRMRq

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\まりあ [Maria] 純真無垢Part4[IMOG-182][60fps].mkv.torrent"
    1⤵
    • Modifies registry class
    PID:2240
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Program Files\Windows NT\Accessories\WORDPAD.EXE
      "C:\Program Files\Windows NT\Accessories\WORDPAD.EXE" "C:\Users\Admin\AppData\Local\Temp\まりあ [Maria] 純真無垢Part4[IMOG-182][60fps].mkv.torrent"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads