Analysis

  • max time kernel
    369s
  • max time network
    1607s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/05/2023, 17:32

General

  • Target

    ninjaripper1.7.1/tools/3dmax_maxscript_importer/ninja_ripper_1.3.ms

  • Size

    18KB

  • MD5

    cf0cbb596fd1ba36282c61c0283f31ba

  • SHA1

    4f86042e06a318197a0f7af8bce0f5fdc9df8031

  • SHA256

    552e9f63d32e86379c68cc865a0ba297a8f7fada90e02fd41c95f28d19ee8f2f

  • SHA512

    559e313c08efb8cbb823a9fda278ed3c08a5aa7ab89e17a20ad1ae76efdcbea402e6843cf580064d027f4ce03e32d300f7cfb18bb3fcefae07b02898faa71970

  • SSDEEP

    384:FQvc+Hy2Ck8vs8IIAKo8uZDPvOl6eOLFeBhZhvGWGdsJmrKz:Fx7u8vs8I/O5OLFe/GWosOg

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ninjaripper1.7.1\tools\3dmax_maxscript_importer\ninja_ripper_1.3.ms
    1⤵
    • Modifies registry class
    PID:1224
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1784

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads