Analysis

  • max time kernel
    314s
  • max time network
    1605s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/07/2024, 16:33

General

  • Target

    Solara/Monaco/fileaccess/node_modules/mime/types.json

  • Size

    30KB

  • MD5

    4ac089e4f393ed139cb2ee55726c66a5

  • SHA1

    caccd2726f4694fa5a276f34a28c29e8fb073ef5

  • SHA256

    a5391e434b1d3d1ad0ffd2c7d2227b4dc3ceac7fc263d2ec1b93c20b9daa41f9

  • SHA512

    3ccda52104ca63ea2666d668f784b8f74e258896cd45f24d2f83bd0d3d09d938c2ffec926b1b3fd0a8c455139629e69671129de0d0072bedb8d1b6b3b2260e22

  • SSDEEP

    384:gCqLMYcyVwqbEqM+/vGmvLDMWTktVpnKEXrxoEYlzKO7ELn9c51Fq3zMISyHV6Dx:4EqZGpKEXrxoEY8O7J51Fq3XH+9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Solara\Monaco\fileaccess\node_modules\mime\types.json
    1⤵
    • Modifies registry class
    PID:3660
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads