Analysis
-
max time kernel
94s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 08:37
Behavioral task
behavioral1
Sample
INV_273648.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
INV_273648.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
image.zip
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
image.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
image.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
image.exe
Resource
win10v2004-20240709-en
General
-
Target
image.exe
-
Size
468KB
-
MD5
4fb5090538b3edc903dc50c573c53f2b
-
SHA1
ba76522813473f15a86b42e63948955f24fb4665
-
SHA256
e87583b2896c8220f082881dfe965e3b754dca73b0d36e0bdf0032730d3bec66
-
SHA512
eb2340433ec700bc55480b491fb933c4871f26fb2182210714b2ba29219ad45fb6302de745addee6570d1928189549d76e7d8a6df9a8672b38ae4c02901d9fec
-
SSDEEP
12288:vrvKiO1Z3Ydho6XBo8A46A9jmP/uhu/yMS08CkntxYR:vruyh9zfmP/UDMS08Ckn3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2652 image.exe 2652 image.exe 2652 image.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2652 wrote to memory of 3988 2652 image.exe 86 PID 2652 wrote to memory of 3988 2652 image.exe 86 PID 2652 wrote to memory of 3988 2652 image.exe 86