Analysis

  • max time kernel
    293s
  • max time network
    350s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2024 18:54

General

  • Target

    Pizza Tower - Megaleak Experience/sound/Desktop/Master.bank

  • Size

    4KB

  • MD5

    7043901b2a6891d362f43e9b39186cf9

  • SHA1

    49a8bbcf780362954eab24ad47d94a988150ab6a

  • SHA256

    466366dd17fcd71a524a183aa0a6d0e0a08006bae97732a1512d5fdf56ed4267

  • SHA512

    9005fae733392d46a631b67d5b70b7ce3eaef24504a352426ee00f5e2eb79d5bf2fde71f287e12d3ada9f7f55adc0fc96748467120a2f493c157eae82894d973

  • SSDEEP

    96:TQ/RbabT+2LvHsKQKOhp17mj9FtPrKZ5JNtbr/QJaJZx+UtBJ7rKa0afq:kZmDgKjO8ZXTyPPYuPtB1KAfq

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Pizza Tower - Megaleak Experience\sound\Desktop\Master.bank"
    1⤵
    • Modifies registry class
    PID:4216
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads