Analysis
-
max time kernel
72s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 20:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SpaceShareDist.rar
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
SpaceShareDist.rar
Resource
win10v2004-20240419-en
4 signatures
150 seconds
General
-
Target
SpaceShareDist.rar
-
Size
23.9MB
-
MD5
5a92938a7ac93189cf96104c7d2d4315
-
SHA1
96e9c3dd345d12f2739fe64f48453201ff15a186
-
SHA256
41939fb736d55fb1c9f924edc96f4c7cd2529327fc2acb0b69b1f50c36566958
-
SHA512
05fca82da45fff836be2938bfc994aab967bf1212013d91a1b7c260c92e76d0a75cb55edd1731c3e8592533b2e1ccf079d080b96758dca390087bed41dcdb51a
-
SSDEEP
393216:nQJt2n+f7xtauV7C+jhHPI9ptgpZIhfh1hZa14FHLCJ9ttnKovoG45p52NJLqCex:nQJhxI1W1P4gDI71hc14FHKPnvToMNJe
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4072 OpenWith.exe -
Suspicious use of SetWindowsHookEx 43 IoCs
pid Process 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe 4072 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SpaceShareDist.rar1⤵
- Modifies registry class
PID:2672
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4072