Analysis

  • max time kernel
    87s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-02-2024 18:05

General

  • Target

    Portfolio/assets/bootstrap/css/bootstrap-reboot.min.css

  • Size

    4KB

  • MD5

    fe22eb40bccf202f876ca3d07d4c1e06

  • SHA1

    4a25dacd8b5c5715e04a2943e831aa3405eb0c1f

  • SHA256

    97f0549ae1b86791420890ae5c5b6ec5af448ef05a4d9f924e824c48a380ac73

  • SHA512

    d12d66398d7a770be4db19e022e6adc8a05a134c5435bf0e88e514cb5113ca802aadb68fd1f3940e719353a4d70f995d6c4542f5dfec35fa4635740204e60b00

  • SSDEEP

    48:N4LdnM9SRCxJTE36XdLyTfvvn8lcy0aW+jfO0oD0z8KQbHtpxstoDXRxlQsX4099:qM9SgrU6XdWIGO5oDHKQbZsSBXQsLFF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Portfolio\assets\bootstrap\css\bootstrap-reboot.min.css
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Portfolio\assets\bootstrap\css\bootstrap-reboot.min.css
      2⤵
        PID:8

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads