Analysis

  • max time kernel
    133s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-02-2024 13:10

General

  • Target

    locales/es-419.pak

  • Size

    515KB

  • MD5

    5abcb35738fcb4217888925eaa8f943b

  • SHA1

    a195fb95343d2fad6ec79a80efc848497f2b0083

  • SHA256

    51ff321a6612d56daabc7874ec306680f610c391ff4392c61a59d3ac2a3380b5

  • SHA512

    1272ddc6310fa9135e327111c6426fff39187df07d770b9fb366d6a87922e5ee1dd81cc676b17f8ed6370b786badf92c850910674ef5dadcef3bc7987ea62d3c

  • SSDEEP

    3072:Ln1o/wiAUJHOkNejz28CU1g6Cjnp4EcO37Su8pnYl4lbjK2oE1AozsoLhWRR5BXF:LnAwlsejlHDXzpnY8KJ5BXmLFmQIzL5

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\es-419.pak
    1⤵
    • Modifies registry class
    PID:2956
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads