Analysis

  • max time kernel
    141s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/05/2024, 20:09

General

  • Target

    content/avatar/character.rbxm

  • Size

    26KB

  • MD5

    dd57193b0b60e1caf22544e05bfa180f

  • SHA1

    8abbfa60241ee266cc76bcfea1cd7bc1fadec4da

  • SHA256

    d8fc2950ab9fa5762838d3c09af5e35d01749cbd5d4b67e1b829091619291208

  • SHA512

    fdc4ab94fa50c34d9a751aa250b0936416d571163e0846602f255bb3ec59984bfb015310457ecfe1fcd893cadf912d8199f29cf3c0a4a6d774332d15ea34090d

  • SSDEEP

    384:aj61+KQmElpBpbpopsWGYipXpAZpnpBpR8prpyp9Y1Xp7pqUd1dpPpdi13pN31ae:ajMI/NysDZA3p/RGdY9wtqUfxdkN279C

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\content\avatar\character.rbxm
    1⤵
    • Modifies registry class
    PID:4824
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads