Analysis
-
max time kernel
129s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
05-05-2024 16:42
Static task
static1
Behavioral task
behavioral1
Sample
Quote.lnk
Resource
win10-20240404-en
windows10-1703-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
System Volume Information/WPSettings.dat
Resource
win10-20240404-en
windows10-1703-x64
3 signatures
150 seconds
General
-
Target
System Volume Information/WPSettings.dat
-
Size
12B
-
MD5
b4f3927793f1c57f7e54b58adb494166
-
SHA1
bd01fd729a0cc4af82aaef12e854bfc37d56315b
-
SHA256
47c3ccb835be708bec9cd198082ff3ba49ef7646274aed09a63f5184d6964ea3
-
SHA512
29998c6ab856ca36fe0cab15796b10cf3e0b2c3d656e65b96c699aa4a8f934415d1b5bb156309f7fe585a57379ddb5c17f9de330f8953238b86d4ef8a89b1511
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 380 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat"1⤵
- Modifies registry class
PID:1412
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:380