Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 16:21
Static task
static1
Behavioral task
behavioral1
Sample
Cab7947.cab
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Cab7947.cab
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
authroot.stl
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
authroot.stl
Resource
win10v2004-20230915-en
General
-
Target
authroot.stl
-
Size
163KB
-
MD5
9441737383d21192400eca82fda910ec
-
SHA1
725e0d606a4fc9ba44aa8ffde65bed15e65367e4
-
SHA256
bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
-
SHA512
7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
SSDEEP
1536:AA8JXlCUs0RvWqgCyPW5BXNWdm1wpyru2/3EwjYoz0VDTrubmt6t+:AtJXq0RuXCyfdmAyru2/RAKtU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe 2848 OpenWith.exe