Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-es -
resource tags
arch:x64arch:x86image:win7-20240419-eslocale:es-esos:windows7-x64systemwindows -
submitted
21-05-2024 15:36
Static task
static1
Behavioral task
behavioral1
Sample
api ziggy twittee.json
Resource
win7-20240419-es
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
api ziggy twittee.json
Resource
win10v2004-20240426-es
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
api ziggy twittee.json
-
Size
5KB
-
MD5
8cb3fddafea78cfbff6a4a762340bb5d
-
SHA1
f209b2ab4a300a53f5c15eefdb083420bf6a189f
-
SHA256
e585570e28f83461c069163bf63025e41359fff371b2eeaeced35f70af47506b
-
SHA512
a24e723449b1cf71f9620e8d8d6d6ef3b989574eb1934583100f8e351524ccbfb6ec9b4d8bf3e58d4d585d3334cfc1b23b6e344f6465b9e68983de91fc22cc11
-
SSDEEP
96:p5q5sFivroYSYAfiv7JrujyZg+96NgKxsfdYszvd19cGg0Pab:9FiaJqzJWRxs119chb
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2748 2952 cmd.exe 29 PID 2952 wrote to memory of 2748 2952 cmd.exe 29 PID 2952 wrote to memory of 2748 2952 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\api ziggy twittee.json"1⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\api ziggy twittee.json2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2748
-