Resubmissions
12/06/2024, 13:36
240612-qwfxyswhph 3Analysis
-
max time kernel
1s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
Neverlose.rar
Resource
win7-20240611-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Neverlose.rar
Resource
win10v2004-20240508-en
3 signatures
150 seconds
General
-
Target
Neverlose.rar
-
Size
238KB
-
MD5
5458d4062a78b3f5a021319f8f8eea07
-
SHA1
afe5b7c6ad5de8563fea4f44cf074f998ebe9568
-
SHA256
0687436d32d4f8f350cc459ed477450d6cae486ac5be310af50186a934b8e2e9
-
SHA512
2ddbdb262d77e2da97fcb22b9895053151312c845ebcbc0561dcf9926d4bf16e92b8b539ee37261ad8cbd6748607d95aa57a3d7c273c16dd0f9e84a127924305
-
SSDEEP
6144:Y0heMuOLspYVRwTiqoBzoO03u88FjjuU4+kP1Jj:RNoOeuzE+kP1Jj
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3004 2212 cmd.exe 29 PID 2212 wrote to memory of 3004 2212 cmd.exe 29 PID 2212 wrote to memory of 3004 2212 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Neverlose.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Neverlose.rar2⤵
- Modifies registry class
PID:3004
-