Analysis
-
max time kernel
87s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/03/2024, 16:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
T̷h̷a̷t̷̷s̷ N̷o̷t̷ M̷y̷ N̷e̷i̷g̷h̷b̷o̷r̷.rar
Resource
win11-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
That's Not My Neighbor.exe
Resource
win11-20240221-en
1 signatures
150 seconds
General
-
Target
T̷h̷a̷t̷̷s̷ N̷o̷t̷ M̷y̷ N̷e̷i̷g̷h̷b̷o̷r̷.rar
-
Size
242.9MB
-
MD5
f70191bfb32dc9acb75e4618ca3ce89b
-
SHA1
7a99adf665c174112547b6de108a8b6ce802cbea
-
SHA256
1cf6a64074afa3137d9d7f98883fad5ec01d8f14dd44ee43b77fa11c4a9e0742
-
SHA512
29fab55f228d4d891a3bec4465f57fa1627c85a142e37dc96eef754414d6dbd044c605624b57e84528ae24403be985767e9b0eb0574b2a6b3407285f06621dfc
-
SSDEEP
6291456:YQyevzuV31yTsqok0ibZaD9k3PjoLt9W5uopWzZ1MUDYur46:B7LuV31ygqokJ8DKfotE5p0N1MuJrn
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1816 7zFM.exe Token: 35 1816 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1816 7zFM.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1816 1612 cmd.exe 83 PID 1612 wrote to memory of 1816 1612 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\T̷h̷a̷t̷̷s̷ N̷o̷t̷ M̷y̷ N̷e̷i̷g̷h̷b̷o̷r̷.rar"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\T̷h̷a̷t̷̷s̷ N̷o̷t̷ M̷y̷ N̷e̷i̷g̷h̷b̷o̷r̷.rar"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1816
-