Analysis

  • max time kernel
    90s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 22:14

General

  • Target

    SHIN MEGAMI TENSEI V [0100B870126CE800][v131072]REPACKLAB-ROMSLAB.nsp

  • Size

    251.3MB

  • MD5

    87ae72f024f0438b83bd66e10dd17fce

  • SHA1

    590a7f7876d1729a00163355dac19ec5f227a5c5

  • SHA256

    4c82fca5478506670ebe235c1659e3ac5c81ac36536b8074e53fc9e6c30d456f

  • SHA512

    5e22657014787ce9f7ffe5d12469d4ea5a58c53c7244e0d4c421ecbdf3c8cb9193e4b83ff7e38071332cbc7e3efe12e73cc257de58980b7cd6e22a1053cccaa9

  • SSDEEP

    6291456:KL/L5xNWNkrPEAX/Xy06pWjzdJXyBO5jYG1S:KL/1xNWNkrcAn6pEiBaS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\SHIN MEGAMI TENSEI V [0100B870126CE800][v131072]REPACKLAB-ROMSLAB.nsp"
    1⤵
    • Modifies registry class
    PID:860
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4448

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads