Analysis
-
max time kernel
139s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 05:42
Static task
static1
Behavioral task
behavioral1
Sample
test_dump_dailyfile.sh
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
test_dump_dailyfile.sh
Resource
win10v2004-20240508-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
test_dump_dailyfile.sh
-
Size
1KB
-
MD5
93d79774f26ddeacdaa476964647fa9c
-
SHA1
4510583d65f47b452f7a2f776fd4ac0c7591a0b8
-
SHA256
4dfe5767d0253a6760cfc061d72803a30b9ea00400b6315f7dd1468661970261
-
SHA512
c7e2f794985da7c796d416f7703ff0cfca438669e0409d4348cc21dffa010e0fc165fe38ac3a044181afc437dc813c4d44a3e3b533c6b7115c0227fe0be181e8
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4472 OpenWith.exe