Analysis

  • max time kernel
    1763s
  • max time network
    1585s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-05-2023 17:32

General

  • Target

    ninjaripper1.7.1/ripdump.exe

  • Size

    111KB

  • MD5

    8d609911365949348777f5db224ebd75

  • SHA1

    78a047d2dc6980c0c453c404f13fa13756a1123e

  • SHA256

    1e6c5b07d3903ad9e1a715b4585e4d7dd1ab3995652fddea6f01ef4413f032af

  • SHA512

    bebb763fba396eb2a68434551ef8ff83e9f4fd47ea4cb84662e895f4342b841353a4ee918accd1bc95ad5420255e0fd0716844d9eaf84cfd22090215b2f43a20

  • SSDEEP

    1536:cw8sBGZ2acw+VWXEzzeOLOiYMJyQnsOxfifc7pesWjcdL+f+uXBdM:qqGEzTWUfZDhqopBL+fpf

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ninjaripper1.7.1\ripdump.exe
    "C:\Users\Admin\AppData\Local\Temp\ninjaripper1.7.1\ripdump.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

    Filesize

    14KB

    MD5

    9f5ecb12820eead5dfef013de17a1f9a

    SHA1

    73aebea964b5c6f16fc9ab0db2373fb0c958bc2f

    SHA256

    7b2c6ad319edd6f534243874cb60b1eefc6942d86447f1db806c27e6261c980f

    SHA512

    67e136b04cfd4f3268718c6f33d3392f9fff2e9e2e818d94d2a363e72e0cd5a15e762239a1a5ddbec6938fb400e9bd34d2af84fe594095cfb522fbc753095577