Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
B6BDFEF3E79E823946F0E9B6437D46E23144307565CE91E2A437CA1CDF468B4E.iso
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
B6BDFEF3E79E823946F0E9B6437D46E23144307565CE91E2A437CA1CDF468B4E.iso
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Accounts_Satatement__2023-0614.js
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Accounts_Satatement__2023-0614.js
Resource
win10v2004-20230703-en
General
-
Target
B6BDFEF3E79E823946F0E9B6437D46E23144307565CE91E2A437CA1CDF468B4E.iso
-
Size
68KB
-
MD5
d7def9c25a02693c5890f51dd2f2e2ec
-
SHA1
12d2ec37991d425e21d315a3c2fa9b2f9002fbcf
-
SHA256
b6bdfef3e79e823946f0e9b6437d46e23144307565ce91e2a437ca1cdf468b4e
-
SHA512
5bde3365d14441866530e24cb7d89e14dbb14072be0974446230f6dd3ae19c5acd726ae4ed8ac387f17831277d2cac5d5da698fb2eee2078e93c918e0744063e
-
SSDEEP
192:kHr4D7ZVh1VsO292ZM6DLKElsAVUh8As:wuVOQGNtaV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeManageVolumePrivilege 3796 cmd.exe Token: SeManageVolumePrivilege 3796 cmd.exe