Analysis
-
max time kernel
1645s -
max time network
1749s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
download_5fdg452d.torrent
Resource
win7-20240221-en
windows7-x64
50 signatures
1800 seconds
Behavioral task
behavioral2
Sample
download_5fdg452d.torrent
Resource
win10v2004-20240419-en
windows10-2004-x64
4 signatures
1800 seconds
General
-
Target
download_5fdg452d.torrent
-
Size
24KB
-
MD5
41b7c70f3cebabf238b279a98a0fb058
-
SHA1
a57954251390912948907589940ffae483ea1392
-
SHA256
236abc9e419388c8554fc3d8a0e1fc20dfbf54955052839cddcce7c3fe26834d
-
SHA512
9ca1643903964b0dd2738f7d85a47d67e05ebb0f2cf97be031fb7cb4b56952d299e87aabe03fdfe9440364195c6adefca23fd955f24e7d026b9b2a8fbc27e763
-
SSDEEP
768:hmnjxv7cx9MLA0BQf5AlIjTBS44JyVkFNvb0odbi:kR7cx9EufulZ4Omode
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid Process 4396 OpenWith.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
Processes:
OpenWith.exepid Process 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe 4396 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\download_5fdg452d.torrent1⤵
- Modifies registry class
PID:1032
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4396