Analysis
-
max time kernel
449s -
max time network
450s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/02/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft-Activation-Scripts-2.5.zip
Resource
win11-20240214-en
0 signatures
600 seconds
Behavioral task
behavioral2
Sample
Microsoft-Activation-Scripts-2.5/.gitattributes
Resource
win11-20240214-en
3 signatures
600 seconds
General
-
Target
Microsoft-Activation-Scripts-2.5/.gitattributes
-
Size
65B
-
MD5
88d14d2d359741b47a06c85d7504652f
-
SHA1
ef563202c6d64aedd79be62cdd0e46dfb49de9f5
-
SHA256
c33c2a42b6f28c4916b5afe078fd18ad7e92e794170246cff43a493074ddaa36
-
SHA512
b39db2c8d81300231b87d440a992b33652d6be9fd8f5300893883e396064e07e7f371b541d16e8b302c93323d09342703375227bc77c3e33d40d8c600b486032
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1473553098-1580226532-3330220195-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1473553098-1580226532-3330220195-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 460 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Microsoft-Activation-Scripts-2.5\.gitattributes1⤵
- Modifies registry class
PID:2588
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:460