Resubmissions

13-02-2024 12:04

240213-n8wg3ahc2z 10

04-12-2023 18:50

231204-xg8gzsec21 10

04-12-2023 18:47

231204-xe7gxaec2v 10

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2024 12:04

General

  • Target

    Kviitung_04-12-2023.rar

  • Size

    602KB

  • MD5

    fea76b9861cd494170f5edd89179dbb3

  • SHA1

    a5c8b5a1aa7c786463609d0bc844a5710d1b4361

  • SHA256

    128de5e09d0453bdce3abe943b88c72adb065971c9db3ee6e8075bd6651c356e

  • SHA512

    297c0978417152f9b117fb22fa0afa456cf9070606e3965a9df0fcfdb9c62b1fb0d5e8e5af9203a2f20d6bd9af32d62182f24b60ffb5e4305ba0fb09efed980b

  • SSDEEP

    12288:3H8nfotulgPDaqAc07qzo1n9oCgVrQhFBvyR0mMR:3RtdPDaPqzoF9OVrQFd1f

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Kviitung_04-12-2023.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Kviitung_04-12-2023.rar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads