Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 06:27

General

  • Target

    jodit-react-main/.github/workflows/release.yml

  • Size

    588B

  • MD5

    f5f4882532ba5248a143727d9b4545c5

  • SHA1

    abd17f11546bcaca474619bec1f4fd97165c5e85

  • SHA256

    b2654495a9d4d02de5835016bb5957054b8c4df290606179c8504f5f6ac964a1

  • SHA512

    a5830ea3f53c0a2a90b88b9612e5011d93f85e3f0262f37e93ab5eea904f91841756229b612ca28e8dbe4793bbfea18cb874db42d838e3cb34d60bf5c8369561

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\jodit-react-main\.github\workflows\release.yml
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\jodit-react-main\.github\workflows\release.yml
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\jodit-react-main\.github\workflows\release.yml"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    ca65d38394db801177a0acf5d71f1357

    SHA1

    4a1132ba819bd7d424a3c0fb306f2da1b5e2e57d

    SHA256

    b1b759e99ace2a298bb6589ac5e8e32bddf763f2b2a594847f0933cc6f1792f6

    SHA512

    49620c452b8c4250299d714b4bf8c5f85cca9c707b52dcb390818ded5b8682980c4839da5a56ae88d3e004f66532074a442e2f7fb3574615986ac7f27adba9c2