Analysis
-
max time kernel
92s -
max time network
99s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
31/05/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
cardreadertech-AiSR010-decoding-tuto.zip
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
00001_V3.82_18.25.39-websample-singel.wav
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
AiSR-demo.wxt
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
WExtractor 1.42.exe
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
binary-Ascii.txt
Resource
win11-20240508-en
General
-
Target
binary-Ascii.txt
-
Size
148B
-
MD5
47725ef4a122a674e73343f1877dd3ad
-
SHA1
5851cb20b5dacb4d015ae74377e41bf0d39fd2d9
-
SHA256
ceff1dc64c8d75fc96a9819abda92e2b5706ce9fa9458a4766768a7119612ea5
-
SHA512
18027a6d71caebea505b90cae4a0605c48a7889c2d6e6184bb41e0aadbbbb66b6445543b93fbd8e0f6e47f8e171499aae035aa20871ee9321ed79e6f810dcdbf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3836 4952 cmd.exe 78 PID 4952 wrote to memory of 3836 4952 cmd.exe 78
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\binary-Ascii.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\binary-Ascii.txt2⤵PID:3836
-