Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 07:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Silence V2.rar
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Silence V2.exe
Resource
win10v2004-20240611-en
windows10-2004-x64
15 signatures
150 seconds
General
-
Target
Silence V2.rar
-
Size
1.3MB
-
MD5
ebb4ad7f6d832e3948cbe6977b45c70a
-
SHA1
0ce87dfab53dce5ae53ea55f85c77071bb3993e7
-
SHA256
dc179ef7f50e6aaa312f9aa992a397d014b2fbf219151d639cf4f98b6d2dbad4
-
SHA512
f5bc7cabeccd7cfc1eaff8ae64cdb229accdf91b71719d56894d322fa4a00b90fd10e1b7eed65d84e1bd44d9c907652acc7751394dba91e88e7722afe4755d65
-
SSDEEP
24576:ipuj0WnkUVFJrix6d/YuiGQaes29fmvteYBtUI4reFUS/XvE:ip8kUrNEsefmUYjP4reUl
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2276 OpenWith.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe 2276 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Silence V2.rar"1⤵
- Modifies registry class
PID:3444
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2276