Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/07/2024, 13:48
Behavioral task
behavioral1
Sample
RDR3.zip
Resource
win11-20240709-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
Leia-me - Readme.txt
Resource
win11-20240709-en
3 signatures
150 seconds
Behavioral task
behavioral3
Sample
RDR3.exe
Resource
win11-20240709-en
9 signatures
150 seconds
Behavioral task
behavioral4
Sample
blxstealer.pyc
Resource
win11-20240709-en
3 signatures
150 seconds
General
-
Target
Leia-me - Readme.txt
-
Size
220B
-
MD5
04febeebdc87b29988e891d25c40cc3a
-
SHA1
80cc713b86169ff15c5d3f7cd2b53b612ed9c7c7
-
SHA256
b9d3c54768cfff1980bffb2f9d48edeb8eaeb7f37923911ea6d8ba16011bd0d4
-
SHA512
8953ffe2171548e5727bf6b8f9a07c68fa14f3c9b25d9d0cbfc5b3476edd99d5cac1536bb0b2708dab59535e53696dc33eb105a82fb907a6bbfb8b742f01ee28
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2087971895-212656400-463594913-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5116 wrote to memory of 728 5116 cmd.exe 79 PID 5116 wrote to memory of 728 5116 cmd.exe 79
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Leia-me - Readme.txt"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Leia-me - Readme.txt2⤵PID:728
-