Analysis

  • max time kernel
    88s
  • max time network
    101s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-06-2024 21:40

General

  • Target

    Kiwi X/bin/workspace/Self Bot RMA/saved_admins/Here.txt

  • Size

    23B

  • MD5

    118e5315caf3e357c30c45affa9e8e3e

  • SHA1

    114e3cf096058a901a98443adb14aa035edeb7ff

  • SHA256

    b52f4b1df7c635df62bbce27293474403020fe68b0f66d9547e170f3e6efe482

  • SHA512

    c8f74cdef19ab610bf2f1d39b6f8b06c28669f39c281ef230cfec6ef596f4902a5b6f19abc07ae6bc6ce2c02c29107c3840037d9f24fbc8661d27e0bf359529f

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Kiwi X\bin\workspace\Self Bot RMA\saved_admins\Here.txt"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Kiwi X\bin\workspace\Self Bot RMA\saved_admins\Here.txt
      2⤵
        PID:240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads