Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 20:41

General

  • Target

    PizzaOven.exe

  • Size

    6.6MB

  • MD5

    0532221e10e8a49c3b868eb5547450f3

  • SHA1

    f5d6e2ba7de8cd42701210a40104a4f5708eef6e

  • SHA256

    45199e9991e7c195b38a544d117b59a530bf2323939430c1af6f900fa0e6a521

  • SHA512

    67986ab1a5d92ddce80ca86f097c7c7ab58ce32fe1e597d064a123e180d823abca0172d15ecbd5924effd1590398791973ec9ecbf135343e2389000f6f458a0b

  • SSDEEP

    49152:lYB9bimBrilQll4VlvHe/u7x2G+5I9qWVdMljmCC/73w0T9MX:kxilOwlv++sG+/Zoc9

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PizzaOven.exe
    "C:\Users\Admin\AppData\Local\Temp\PizzaOven.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3900

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads