Resubmissions

09-08-2023 01:09

230809-bh9ksage22 3

12-06-2023 15:59

230612-tfk4hsde3v 10

Analysis

  • max time kernel
    383s
  • max time network
    1218s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-06-2023 15:59

General

  • Target

    Telegram Desktop.exe

  • Size

    3.8MB

  • MD5

    1d156ea00258d8c5ed190ab425b6bf67

  • SHA1

    92014a052c4654a167e933702d8b12b13ca6a90d

  • SHA256

    96890d1d86aad9940fd54604ef09dd7e2dcf5cc084eeaf63a1062b4fbead91ae

  • SHA512

    1eaa1fe0a8bfab0004d6dc5b773f710aebd5027f2258e41b5cf24eb164a70eb65a2395cee7d3244898e011baee3e3fc6d83dbcfbe1048d117984fa9fc40d8a54

  • SSDEEP

    98304:iFgMEhr3Or19KXlcw1CdU2uP318hXjETV:uzGrO4n2uP3iwV

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Telegram Desktop.exe
    "C:\Users\Admin\AppData\Local\Temp\Telegram Desktop.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads