Analysis

  • max time kernel
    140s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-05-2024 23:37

General

  • Target

    GANG-Nuker-main/README.md

  • Size

    5KB

  • MD5

    63c894aa7e18b8117f50ffa34111c26b

  • SHA1

    906e5c6b3834a3c3e83fdfbf4e90f08c1849e32f

  • SHA256

    45d542ed17689a9bb28ec3f38de75aafd226de3bafe945a0e6e9e22f9edbd343

  • SHA512

    b6d1ab5459f82f2676b5f1ec52203408b7215028afa23477affbde6a7e851e840a83744ed255857a837804036c002345d574a6e1236d160fa8987fc508f216bb

  • SSDEEP

    96:YP+ESAtZEywwF+fSAg69OJCNVqr3an9kVftQDkuZDlXeeWoH5QEAfa1syx4jUB:+2dSAl9rNIr3a9kgAuooZQEAy1sySjk

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\GANG-Nuker-main\README.md
    1⤵
    • Modifies registry class
    PID:976
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads