Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 21:03

General

  • Target

    010 Motive.pth

  • Size

    566KB

  • MD5

    c835ea84b5256a41cdf5c363f4068706

  • SHA1

    88ae3a1c28bf3e1ca74c3965652637fd2abec9bb

  • SHA256

    42d7394d8fca0f3ff0c1ae36ea2c847552480351f29c951130c4f1747e5e2616

  • SHA512

    18bf4a6f9fdd03b2330183b6b0956352a674bfb78cd534dfd1dce2e5a93eed7582aa94d7bff3f9383f8100a0685c7f0d208581fdf12cad74b4a7b7e27ad1dfaa

  • SSDEEP

    1536:CHhWuh7x+UQ/Vu4DE2RzLMeqRvyodqsQHh/:u7x+7/Vu4D/tLMemvyodTy

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\010 Motive.pth"
    1⤵
    • Modifies registry class
    PID:872
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads