Resubmissions

21-05-2024 14:43

240521-r3mvhshd83 3

21-05-2024 14:40

240521-r1yh8shd44 7

21-05-2024 14:37

240521-ry949ahe2z 7

21-05-2024 14:34

240521-rxpf6ahd6w 3

21-05-2024 14:31

240521-rvybaahb79 7

Analysis

  • max time kernel
    29s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 14:40

General

  • Target

    Some Problems/Copy of clientlib(17).css

  • Size

    7KB

  • MD5

    1d1f6aa16702e4a9277bcb9695b60c1a

  • SHA1

    a7285ee27da69175b5a45e55ece5557fd094885b

  • SHA256

    872b23b59e1550aaaa9da2f40ba024a778188d5a05dcdddda1d7a8e2277d9fbc

  • SHA512

    0ee0fc7c7ace0140013b2c6f9d019d404dd0143e17bfaafdcfd556468bdee8efc64ddfe54d6cfd4d14ec9ac55f9e3e36a4855a0b1b87245a02b6abeb53785d64

  • SSDEEP

    192:mjCSHMJBkSeZB+bfqyEOHL5Au/tFkT9rvKcKaZBKyEOHLrbfjAuyahB7XhF7OD:mjCSHMJBkSeZB+bfqyEOHL5Au/tFkBr8

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Some Problems\Copy of clientlib(17).css"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Some Problems\Copy of clientlib(17).css
      2⤵
        PID:4560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads