Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 01:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
CallofDutyScript.exe
Resource
win7-20240508-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
CallofDutyScript.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
CallofDutyScript.exe
-
Size
52.6MB
-
MD5
770155453b6fd11d6a078b656669f1d5
-
SHA1
b56a71256f7740e065253e3d2350610cc38160cc
-
SHA256
830acb954c885d507e63329b74fa39dc4a4526539653ffe4cd0446c883ba1eda
-
SHA512
a390521ae33c4f3d4b0ce05e8bdf17dfd49847127674aa899e731b1192176f385017f517b19b80f7a286d9731777af44a84e5e1425c27cb341dc27f2cef553fa
-
SSDEEP
393216:6a92Yg5sgIF5L1V8d1/e26n/LryfCjDFv:t9S07RqYnzOfkR
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CallofDutyScript.exe"C:\Users\Admin\AppData\Local\Temp\CallofDutyScript.exe"1⤵PID:348
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2432
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\TraceRestore.clr1⤵
- Modifies registry class
PID:2804