Resubmissions

08-08-2024 23:11

240808-26q2fssbmk 10

08-08-2024 23:10

240808-257b2swbpb 10

04-08-2024 07:19

240804-h5xcastflc 10

04-08-2024 07:17

240804-h4g6zszark 10

26-06-2024 01:26

240626-btw4tsyfqn 10

Analysis

  • max time kernel
    137s
  • max time network
    143s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-08-2024 07:19

General

  • Target

    b0e762661eabb0e1fc4a6fa1e662361986db6f8892b9ae14cb17346f8c244866

  • Size

    3.6MB

  • MD5

    4094abf934977da11aaf9aad22e301c0

  • SHA1

    25382cf169f16dcd8d56932b3294719e49564ff7

  • SHA256

    b0e762661eabb0e1fc4a6fa1e662361986db6f8892b9ae14cb17346f8c244866

  • SHA512

    cae8525fcc481e865444a85e5138bb32235f83338889c714fcead1f358d3bae992d42f3196184905a44a5c010fd31485bc85c931edda954cd0aec5e8ff60bd19

  • SSDEEP

    12288:5ozA2n9dH5M2vkm0aFRv3pId9Ri9tvZJT3CqQrhryfQNRPaCieMjdvCJv1Vi0ZLS:5oFdvh1X/z

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\b0e762661eabb0e1fc4a6fa1e662361986db6f8892b9ae14cb17346f8c244866
    1⤵
      PID:4464
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:5084
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1892
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1592
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Modifies registry class
        PID:3452
        • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
          "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\MoveLimit.easmx"
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:1032

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1032-4-0x00007FF7EF8B0000-0x00007FF7EF8C0000-memory.dmp

        Filesize

        64KB

      • memory/1032-3-0x00007FF7EF8B0000-0x00007FF7EF8C0000-memory.dmp

        Filesize

        64KB

      • memory/1032-2-0x00007FF7EF8B0000-0x00007FF7EF8C0000-memory.dmp

        Filesize

        64KB

      • memory/1032-1-0x00007FF7EF8B0000-0x00007FF7EF8C0000-memory.dmp

        Filesize

        64KB

      • memory/1032-0-0x00007FF7EF8B0000-0x00007FF7EF8C0000-memory.dmp

        Filesize

        64KB

      • memory/1032-5-0x00007FF7ED0B0000-0x00007FF7ED0C0000-memory.dmp

        Filesize

        64KB

      • memory/1032-6-0x00007FF7ED0B0000-0x00007FF7ED0C0000-memory.dmp

        Filesize

        64KB

      • memory/1032-31-0x00007FF7EF8B0000-0x00007FF7EF8C0000-memory.dmp

        Filesize

        64KB

      • memory/1032-30-0x00007FF7EF8B0000-0x00007FF7EF8C0000-memory.dmp

        Filesize

        64KB

      • memory/1032-33-0x00007FF7EF8B0000-0x00007FF7EF8C0000-memory.dmp

        Filesize

        64KB

      • memory/1032-32-0x00007FF7EF8B0000-0x00007FF7EF8C0000-memory.dmp

        Filesize

        64KB