Analysis
-
max time kernel
91s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 20:54
Behavioral task
behavioral1
Sample
4VGn41i.rar
Resource
win7-20240508-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
4VGn41i.rar
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
4VGn41i.rar
-
Size
15.6MB
-
MD5
929404f5beeff2bb071bf734c6876bb6
-
SHA1
8cf3da10245e99705ce70beb883aca70db032490
-
SHA256
b2a909fe089d1e70a8e67b048dd1dcc9884bcedafd02a9a32135530088720f7e
-
SHA512
ea3a6607f22e48e1fc601814126e873d773c1a2527147995429a28b2c2771853af9e1983b9477d310e0237691121b84b0e03f82f0668b634b1e84943c3695fde
-
SSDEEP
393216:8ldJw8WDSALid+uGVWDvpVzZ836ioGE7ywkX8MB9/SfdRzTp9:8KPOpDQ8GgYVB96fdRH
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4448 OpenWith.exe -
Suspicious use of SetWindowsHookEx 53 IoCs
pid Process 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe 4448 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\4VGn41i.rar1⤵
- Modifies registry class
PID:4628
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4448
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1992