Analysis

  • max time kernel
    46s
  • max time network
    55s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 16:01

General

  • Target

    .vscode/tasks.json

  • Size

    742B

  • MD5

    cebc21f78b29c3ce3ca2d05bfd4cf7fc

  • SHA1

    20d81e21678e87aa87e843b6ea176e3e8f242723

  • SHA256

    27f0ca5edd474ccba9bbedfa7eba00b6bc09aa0c7aa5969b8d3b45bbd603c034

  • SHA512

    c5526e98b3dd2a1dea324a0cc93af0df9416c80546894f1e89bc665de40bf76aacb5c80323d92cec8f1ea3a49dfe05b35439be898f3cc2b8c54d40ed8c8991ae

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\.vscode\tasks.json
    1⤵
    • Modifies registry class
    PID:3292
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads