Resubmissions
05-03-2024 20:00
240305-yq739aga3v 905-03-2024 19:42
240305-yevc1sfd8v 605-03-2024 19:37
240305-yb993afc7s 105-03-2024 19:36
240305-ybajfafc31 105-03-2024 19:33
240305-x9h3ssgb64 105-03-2024 19:32
240305-x9bnqafb5w 105-03-2024 19:32
240305-x84ywafb5s 305-03-2024 19:29
240305-x7cs1afa7y 305-03-2024 19:25
240305-x5bsxsga34 3Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-03-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
14 الف طريقة.txt
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
14 الف طريقة.txt
Resource
debian12-armhf-20240221-en
General
-
Target
14 الف طريقة.txt
-
Size
429KB
-
MD5
124e27f20c2eaf1aa34ba40f452d293d
-
SHA1
357d796b9ec96ecaa1519abfa0ca19108c56d230
-
SHA256
29bcc5b6c2170771e8976f1c898726e466a454f0dcff1b9bfa93f0077d168d1c
-
SHA512
f47deb1de1d63e56185933a9a3cda1154b54db30af6fc7f331cdc67a468ddb589e1c1876b02bea8b3abd32c03a768c9d0e0011cfacb2b01ef41a24d40caa274b
-
SSDEEP
6144:cKGKHKncAcscQXyXAYJI0CJEFdBgU8E0HZmFaqcscCHZmFaqcsc12jBgiGq9:yoiqyl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1844 wrote to memory of 1488 1844 cmd.exe 80 PID 1844 wrote to memory of 1488 1844 cmd.exe 80
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\14 الف طريقة.txt"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\14 الف طريقة.txt2⤵PID:1488
-