Analysis
-
max time kernel
79s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2023, 10:52
Behavioral task
behavioral1
Sample
Phone Number Verification Bypassnls..scr
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
Phone Number Verification Bypassnls..scr
Resource
win10v2004-20231127-en
General
-
Target
Phone Number Verification Bypassnls..scr
-
Size
571KB
-
MD5
f1bc7841474849a77e8e0b2e507f2ac7
-
SHA1
eea072584a9227f763d15d784eb52c64453c9505
-
SHA256
3b2776d93feca48f02f530dff6a3d4d918d94ce4e61c249b9f51f24d1d090d74
-
SHA512
e9d342ea6620fc1b69868d5b503363a685a50e7184ba28c310f9648b85ebbb3684eb5be08ff5dd678e1026499fe2c562eb45b0c28228e96b7746553f6a1d12b7
-
SSDEEP
12288:C7oVrmFrSStI0kPUjGn61DfVwZ3pSOPXb2c1wxC3Si+hjTO6HH:3i/i4Jt9wZ3/bTwxQgVTOOH
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4460-0-0x00007FF777040000-0x00007FF7771A4000-memory.dmp upx behavioral2/memory/4460-4-0x00007FF777040000-0x00007FF7771A4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 992 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4428 4460 Phone Number Verification Bypassnls..scr 86 PID 4460 wrote to memory of 4428 4460 Phone Number Verification Bypassnls..scr 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Phone Number Verification Bypassnls..scr"C:\Users\Admin\AppData\Local\Temp\Phone Number Verification Bypassnls..scr" /S1⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\Sbl0V4V9R5.sln2⤵
- Modifies registry class
PID:4428
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD549e83452237bee03b19fcf08da6f1d9c
SHA16ab1082f3e64030b998cb1202b77e0817e051f9b
SHA25697befc6c51ae1ea71ba40f0a0ae8bad63d45522d121cfa7bdac024d40351fdcf
SHA51280d05f957efa5ff437f6cce58d77a2c59e8c0034eecaa05a3dcd0b8f1e95964c2c726886f800d002249650629bf48dc767652ee897b717c2edee2e55acb71bc2