Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
25-01-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
bab4662c-4509-4723-ba32-e0125b867011.zip
Resource
win10-20231215-en
windows10-1703-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
createpage-entervariables.action
Resource
win10-20231215-en
windows10-1703-x64
4 signatures
150 seconds
General
-
Target
createpage-entervariables.action
-
Size
47B
-
MD5
16c3a2575e888d397655e8af167a3257
-
SHA1
fa57ae99b8abe94aa770f5081669f74ad5d53221
-
SHA256
ed00afa7c9cdd92e4e2dc16bf79073c715dbaf73e318dbc3129bc75a84e9ad58
-
SHA512
8eec18a9f3605dc591c16f1dc2400aeda71623d3639afb07c4667b8c974ee6d578bc16499d2a97542d300d2db1c49e1f436a90ca37d2c5d91e95ff0662d3d623
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3196661410-1888440797-2304965013-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3196661410-1888440797-2304965013-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1668 OpenWith.exe 1668 OpenWith.exe 1668 OpenWith.exe 1668 OpenWith.exe 1668 OpenWith.exe 1668 OpenWith.exe 1668 OpenWith.exe 1668 OpenWith.exe 1668 OpenWith.exe 1668 OpenWith.exe 1668 OpenWith.exe 1668 OpenWith.exe 1668 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1668 wrote to memory of 4448 1668 OpenWith.exe 74 PID 1668 wrote to memory of 4448 1668 OpenWith.exe 74
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\createpage-entervariables.action1⤵
- Modifies registry class
PID:748
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\createpage-entervariables.action2⤵PID:4448
-