Resubmissions

07/07/2024, 20:29

240707-y91taaxgjk 4

07/07/2024, 20:21

240707-y48lyaxflq 4

20/04/2024, 11:56

240420-n355bagg7x 4

Analysis

  • max time kernel
    127s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/07/2024, 20:21

General

  • Target

    Graillon-FREE-2.8/Linux/Linux-64b-LV2-FREE/Auburn Sounds Graillon 2.lv2/AuburnSoundsGraillon2.so

  • Size

    3.3MB

  • MD5

    50709bc20ad31df746665ee7e6905b4c

  • SHA1

    ad03efd4df18c6b9567a21f664494c194aaf2745

  • SHA256

    d5c762d5f7607754ccdcfdece17758b21ea6d6bd8b2cd650bbe53d98cdb5f25a

  • SHA512

    19b540b6c975b383364fb28b320893d2e7d749aa1e2d1dc5fcd326bf8058ad4646aa09cd01778fb7c4d3f0e646bb955d9527a4b54242a2cafcb0737b38cc2439

  • SSDEEP

    49152:irJPegB6Ifeyqbz8x8GgcqJCSDscuZ/LdiSnHS9ey+bDVq7V0Y/U5+ZTa3JU0/kp:irJ2g7etng8uHZ/Lxy+bZqxscQufzJ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Graillon-FREE-2.8\Linux\Linux-64b-LV2-FREE\Auburn Sounds Graillon 2.lv2\AuburnSoundsGraillon2.so"
    1⤵
    • Modifies registry class
    PID:4640
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads