Analysis

  • max time kernel
    79s
  • max time network
    83s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2023, 10:52

General

  • Target

    Phone Number Verification Bypass‮nls..scr

  • Size

    571KB

  • MD5

    f1bc7841474849a77e8e0b2e507f2ac7

  • SHA1

    eea072584a9227f763d15d784eb52c64453c9505

  • SHA256

    3b2776d93feca48f02f530dff6a3d4d918d94ce4e61c249b9f51f24d1d090d74

  • SHA512

    e9d342ea6620fc1b69868d5b503363a685a50e7184ba28c310f9648b85ebbb3684eb5be08ff5dd678e1026499fe2c562eb45b0c28228e96b7746553f6a1d12b7

  • SSDEEP

    12288:C7oVrmFrSStI0kPUjGn61DfVwZ3pSOPXb2c1wxC3Si+hjTO6HH:3i/i4Jt9wZ3/bTwxQgVTOOH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Phone Number Verification Bypass‮nls..scr
    "C:\Users\Admin\AppData\Local\Temp\Phone Number Verification Bypass‮nls..scr" /S
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Windows\system32\cmd.exe
      "cmd" /C C:\Users\Admin\AppData\Local\Temp\Sbl0V4V9R5.sln
      2⤵
      • Modifies registry class
      PID:4428
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Sbl0V4V9R5.sln

    Filesize

    1KB

    MD5

    49e83452237bee03b19fcf08da6f1d9c

    SHA1

    6ab1082f3e64030b998cb1202b77e0817e051f9b

    SHA256

    97befc6c51ae1ea71ba40f0a0ae8bad63d45522d121cfa7bdac024d40351fdcf

    SHA512

    80d05f957efa5ff437f6cce58d77a2c59e8c0034eecaa05a3dcd0b8f1e95964c2c726886f800d002249650629bf48dc767652ee897b717c2edee2e55acb71bc2

  • memory/4460-0-0x00007FF777040000-0x00007FF7771A4000-memory.dmp

    Filesize

    1.4MB

  • memory/4460-4-0x00007FF777040000-0x00007FF7771A4000-memory.dmp

    Filesize

    1.4MB