Analysis

  • max time kernel
    60s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05-05-2024 04:28

General

  • Target

    MailAcess Checker by xRisky.rar

  • Size

    10.7MB

  • MD5

    3dad23c7ccbb977fa1187875de3fad5a

  • SHA1

    57b8084a4df6c17ca4f2f1346ddac9aaad38466a

  • SHA256

    e335b896c72e9c7b209908925d117d9d960ff6e3140ffa1c4da0f98c22657bfd

  • SHA512

    f0b2af527c87bd25786b388938118294d5ce349e6aed8acf72b2c742716f017c01dc847d4dd35136ab993ed0280659b11d19dc3c07a7a3fa52eb8eeb9ba86135

  • SSDEEP

    196608:7L62h1OT7OvG4JqZuRZK9irLcuHJonDID8nx4DMtYm8NMwLJKjMdYkkC/Xoab7Y6:7LJONunAmLh6Q8xAKY7QjMLzH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.rar"
    1⤵
    • Modifies registry class
    PID:3372
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.rar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1308
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3780
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.rar"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads