Resubmissions

08/05/2024, 20:54

240508-zp39cafa8v 3

08/05/2024, 20:54

240508-zpv8qshe76 8

Analysis

  • max time kernel
    91s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 20:54

General

  • Target

    4VGn41i.rar

  • Size

    15.6MB

  • MD5

    929404f5beeff2bb071bf734c6876bb6

  • SHA1

    8cf3da10245e99705ce70beb883aca70db032490

  • SHA256

    b2a909fe089d1e70a8e67b048dd1dcc9884bcedafd02a9a32135530088720f7e

  • SHA512

    ea3a6607f22e48e1fc601814126e873d773c1a2527147995429a28b2c2771853af9e1983b9477d310e0237691121b84b0e03f82f0668b634b1e84943c3695fde

  • SSDEEP

    393216:8ldJw8WDSALid+uGVWDvpVzZ836ioGE7ywkX8MB9/SfdRzTp9:8KPOpDQ8GgYVB96fdRH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 53 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\4VGn41i.rar
    1⤵
    • Modifies registry class
    PID:4628
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:4448
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1992

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads