Resubmissions

25-02-2024 23:20

240225-3br6psfh6s 6

25-02-2024 18:44

240225-xdwc9aag71 10

Analysis

  • max time kernel
    251s
  • max time network
    252s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-02-2024 18:44

General

  • Target

    crashed_by_vohr.mp3

  • Size

    9.3MB

  • MD5

    0d813790b342f04e991a7f07487d39c7

  • SHA1

    b3b73c636113390813ed338e83530120b5d0b9cd

  • SHA256

    ad15869dd2adda745da583f9c1038ffdb127d7a2bab682b82c9858fd64c32301

  • SHA512

    49b666e7dbed2903a544e04a2a1499537293fb09410d6391fd0f4b9d421880211930988e6aaaa5a99f2ccfd13cd8f7c6237270b34a7dd4fffe33bc13c252cc6c

  • SSDEEP

    196608:OHK+1paMFx7zrfwVsZ1ZfjqkKIdPhvy/dxP:5+14MFx7HfhXfxdTKHP

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs