Analysis

  • max time kernel
    141s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2023 20:54

General

  • Target

    Raftblock v.1.0.1/region/r.-1.-2.mca

  • Size

    1.1MB

  • MD5

    f02769f78d89d8c7da479ef88a148df2

  • SHA1

    83726f7ced2c33e25e0ed8aee2b31d765a49d575

  • SHA256

    7864fcd8f475c2c8b721a57597aa8e311390fb7fb106723cd6fdd0d71c9af4eb

  • SHA512

    60b7bb98263260bce8a6c924fb6c7bef790f53d954ada339ee73dc7376c22f456ecb4325471d032bf3fde6ac4c2809c8d3f7d6f24aacead671bfeaa815d5fb9c

  • SSDEEP

    6144:oOC4yRjwuHd6UUwlXQrXuFjREybqDlPjXX8rxHKfbW:W4yRjwuHd5cuhRLbqDlLXX8Mfb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Raftblock v.1.0.1\region\r.-1.-2.mca"
    1⤵
    • Modifies registry class
    PID:1900
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads