Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
dllmain_cpp.hmwxxc
Resource
win7-20240708-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
dllmain_cpp.hmwxxc
Resource
win10v2004-20240709-en
4 signatures
150 seconds
General
-
Target
dllmain_cpp.hmwxxc
-
Size
688B
-
MD5
d24d301f1043df347af190f31a568a43
-
SHA1
e3fb4b057dc0df0985485f2b51148bbdc66c3739
-
SHA256
35f96db7788189a0cfe84b146d7f0989e6189b0a16e091a74026eff0984cd139
-
SHA512
f357d46bbae6bf8942444438d1515796d33e7e5ddf23728e2f7b206038257db5d60b0247c48c6c247f20c3c62347dafb71b82bf7e7c83203fc3b9a8dab237645
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3940 OpenWith.exe -
Suspicious use of SetWindowsHookEx 37 IoCs
pid Process 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe 3940 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\dllmain_cpp.hmwxxc1⤵
- Modifies registry class
PID:4876
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3940