Analysis

  • max time kernel
    134s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2023, 04:22

General

  • Target

    stage/ice.swf

  • Size

    99KB

  • MD5

    9616d51fc4d4037db450f3f8afdb91c8

  • SHA1

    3229a8f4d7e16c282353ee157c8e994dabe756b4

  • SHA256

    fda9b6d5011b660606b6bfd43e606d0b14e9e36823631b133b1be77b8ccedae3

  • SHA512

    86a1c3b744a873bb1933ea90d8c3d0618df965ec4d3033a22bbd53897d95291d5756b339f8c4adf3171bf28ce2c6c24eb10c57e0342788ea4bb307178da2df9c

  • SSDEEP

    1536:R4qJpJUfe0JRBHda6StftJgcX5WA3na8xTChFcjXr3pSUN5xEaQnkj2qmKZBqLQ8:R4ESe0J23JgcXwegP2Xr3F5Ckj2T8Kv

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\stage\ice.swf
    1⤵
    • Modifies registry class
    PID:4684
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2636

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads