Analysis

  • max time kernel
    91s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 18:31

General

  • Target

    _locales/it/messages.json

  • Size

    47KB

  • MD5

    301b452a24e2c1c038d920b00548ee4a

  • SHA1

    e4c86dd65171d83e7f5400b0e0187417e1129444

  • SHA256

    03866f9632af0df0ac3373a1c44b1535b60219f0bf91bb733a0919751379bffd

  • SHA512

    56d2eed87b7b540d40369546cde02a675adfadd9dfc4f3b6ff3e7a9daad693e1901987bdd3e6b18a437cfe16a1eec4276ec15b322f9e640a3b8bf0799543e867

  • SSDEEP

    768:U5yUE9W+OMkxY8ya54X0zFZcXj4uWv3YdBEFogan5N8T+Bj:U5yUE9W+OMCYda5suIj4uWv3YdBEFozz

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\_locales\it\messages.json
    1⤵
    • Modifies registry class
    PID:1528
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads