Analysis

  • max time kernel
    91s
  • max time network
    95s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-03-2024 16:35

General

  • Target

    BLOODINHERMOUTH.cfg

  • Size

    412B

  • MD5

    303d2fabf07544775f651bfa764ed125

  • SHA1

    2ce4f476d31eca350f88082c2ce8524f3d05e91d

  • SHA256

    01fbf009aa896f3171b20e0c42e60fd5ac4ea4a275ec710d336301e331741d4e

  • SHA512

    3f2ae43ccfad7e910cac0bd47dbb1406a5c8ecceac598e802bbb751074d9aaf08b5baee80ca002a4c509257ebfe75f34eaaacf16f339dd1f9cabe89b3992a1a0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\BLOODINHERMOUTH.cfg
    1⤵
    • Modifies registry class
    PID:4588
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads