Resubmissions
15-07-2024 07:22
240715-h7cexavcml 315-07-2024 07:20
240715-h6h63avcjk 315-07-2024 07:12
240715-h1l1rsxcpe 315-07-2024 07:10
240715-hzfscsxcke 3Analysis
-
max time kernel
29s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-07-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
av-evasion.7z
Resource
win10-20240404-en
windows10-1703-x64
4 signatures
30 seconds
General
-
Target
av-evasion.7z
-
Size
35KB
-
MD5
e0fb582941f9576750310a24d793b000
-
SHA1
ae9d0b7db6889d6c570ae67358734a0c0d76010f
-
SHA256
23dc59dba862efe257b3dd5f7d04cdbb1f6aff7de2c7f5df7ad1d4614a9f6f79
-
SHA512
d2dbbc68e16f3a441a00b4b8be1d46ffb60862a93827466d0092e53f04bc204b96c22071c42b94fee130c77d4929bd6929288fba7c54d82dcfda032b1be9cd58
-
SSDEEP
768:2FaYYBb/cLN+wWD5SWcH3+6EiX2Bj7mzbtuip+pw4PCwXItCjHA6zSKMh:2FaYW/cLNyD5SZH3tFG1k8ipK7attW/G
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3088 OpenWith.exe -
Suspicious use of SetWindowsHookEx 49 IoCs
pid Process 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe 3088 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\av-evasion.7z1⤵
- Modifies registry class
PID:2720
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3088