Analysis
-
max time kernel
451s -
max time network
455s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-06-2024 18:02
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document.txt
Resource
win10v2004-20240426-en
windows10-2004-x64
7 signatures
300 seconds
Behavioral task
behavioral2
Sample
New Text Document.txt
Resource
win11-20240508-en
windows11-21h2-x64
5 signatures
300 seconds
General
-
Target
New Text Document.txt
-
Size
1B
-
MD5
c4ca4238a0b923820dcc509a6f75849b
-
SHA1
356a192b7913b04c54574d18c28d46e6395428ab
-
SHA256
6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
-
SHA512
4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4768 tasklist.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4768 tasklist.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5104 wrote to memory of 396 5104 cmd.exe 81 PID 5104 wrote to memory of 396 5104 cmd.exe 81 PID 3560 wrote to memory of 4768 3560 cmd.exe 95 PID 3560 wrote to memory of 4768 3560 cmd.exe 95
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\New Text Document.txt"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\New Text Document.txt2⤵PID:396
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3608
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4768
-