Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 14:28

General

  • Target

    config/config.json

  • Size

    1KB

  • MD5

    ce134d90408eba39d6b9711b5f520253

  • SHA1

    32275e090259e9e4ae98d423f90718b65ab02a8c

  • SHA256

    03c1e7e923991aa6e61af85cb6b38c2e98f12a631c5fd94b3ab330285db9ad53

  • SHA512

    1208a34d4b27767fa5c6a98f593a184144a169ad009841f2f5f1d4e917133e30e7a1673e467f129ec79de3a436f9560e17148bf87455e4af3f58ac882f661cda

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\config\config.json
    1⤵
    • Modifies registry class
    PID:3408
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads