Resubmissions

05-04-2024 21:46

240405-1mqqxaec37 7

05-04-2024 21:45

240405-1l47xadg2w 3

Analysis

  • max time kernel
    142s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2024 21:46

General

  • Target

    oblivion/x64/Debug/vc142.pdb

  • Size

    1.1MB

  • MD5

    1f6e56db86dcdc9560e134d0d53d7aff

  • SHA1

    13e4cdf95fd93641aa34a4ae354bf762d0b748b4

  • SHA256

    56240847b5c2ab14d9a6a7f49e18925067192c5caa6bf34a7e0a05d3b6ccf427

  • SHA512

    0ad8f8de4b3afde57a213b9f6477ab2dd9237a47a13c0032b2cc0cedc81bc31cf7f263a3cc2f816dac4e8b12d18746ea61482a4994e7fa0c60d58b6d6a0794af

  • SSDEEP

    24576:D31mwSV6rCJMEnhYJykEetKh+XmY1n9XJrLFwtYu:s

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\oblivion\x64\Debug\vc142.pdb
    1⤵
    • Modifies registry class
    PID:2968
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads