Analysis

  • max time kernel
    139s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2024 04:03

General

  • Target

    bin/models/load.onnx

  • Size

    11.7MB

  • MD5

    d6450245abbd7ad58ae5f1071da48900

  • SHA1

    345acae45cc9e24f9244433ed6027674b9ebc44a

  • SHA256

    d851484492048c5e1504e83da6b31586ced631a19ac8c0e8efa056534384e710

  • SHA512

    192016be0f7edec9715f0a44e44dd2b9d9311551b7491933db258a5ffcc348c6ff5f83d557e23acc8ffd24f6c8f18fc550831738b8f507eb7d5d4f256c096b66

  • SSDEEP

    196608:26SYNg/t+ntY9JMtxQCv1X+c3IDtOVxhkVxQVX25YzXDS4tBgt8V4R2Sq1A1vqrx:cTsnG9qtxQEtlOAjhg4laeBe2N21vq6Q

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\bin\models\load.onnx
    1⤵
    • Modifies registry class
    PID:2904
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads