Resubmissions

11/07/2024, 20:18

240711-y3emgavcrd 10

11/07/2024, 20:09

240711-yw6sdavare 10

11/07/2024, 20:08

240711-ywq2xssaqp 3

11/07/2024, 20:05

240711-yt46rssakr 3

11/07/2024, 20:04

240711-ytdntathpf 3

11/07/2024, 20:03

240711-ys5e5s1hpn 1

Analysis

  • max time kernel
    20s
  • max time network
    21s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 20:04

Errors

Reason
Machine shutdown

General

  • Target

    RobloxScreenShot20231231_160103318.png

  • Size

    979KB

  • MD5

    ab50ef9b41f1046bad8a91aef89e76e4

  • SHA1

    511f01a41f8470fb3ee2b45b4dac2edbe2af54f9

  • SHA256

    91d3faef143362ad384934ce71905437c78db2a9e0e6307245771034e0abd59c

  • SHA512

    e7a2a075b7a0c5e268424fd309d2f6613444ce95e76334adde82615096343541a60bac82f25858edd2ddb2aa568efcd2fbed608484c11c56dbad0707ae00b803

  • SSDEEP

    24576:bOINuEEQDf2l3cL7F/AE5A0sxnuONOmsLW4dgNSk5J:HDfJfF/rAZuOr0zdKSkP

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\RobloxScreenShot20231231_160103318.png
    1⤵
      PID:3200
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa399f055 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:1072

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads