Analysis

  • max time kernel
    134s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-01-2024 02:56

General

  • Target

    createpage-entervariables.action

  • Size

    47B

  • MD5

    16c3a2575e888d397655e8af167a3257

  • SHA1

    fa57ae99b8abe94aa770f5081669f74ad5d53221

  • SHA256

    ed00afa7c9cdd92e4e2dc16bf79073c715dbaf73e318dbc3129bc75a84e9ad58

  • SHA512

    8eec18a9f3605dc591c16f1dc2400aeda71623d3639afb07c4667b8c974ee6d578bc16499d2a97542d300d2db1c49e1f436a90ca37d2c5d91e95ff0662d3d623

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\createpage-entervariables.action
    1⤵
    • Modifies registry class
    PID:748
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\createpage-entervariables.action
      2⤵
        PID:4448

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads