Analysis

  • max time kernel
    89s
  • max time network
    95s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-08-2024 15:09

General

  • Target

    BEST NEW RAID TOOL/RTBFiles/attack_dict.py

  • Size

    20B

  • MD5

    36c02632d6bc6b6ad5c31001c6f26c54

  • SHA1

    450d6f23ce00c2f89c89d5784c6788826dfb68d3

  • SHA256

    ceb44a7edf88eb3b31cf90bdb76f47cfa436a710acf0d5c1c769164e3677ffd1

  • SHA512

    711ef59a9254e5d7a466e5d7bd214f5f87e388c1a9ba9e12a455b3a4eb74eff7e36700b4727f959108ecbd27fdef5d447642a681b07d8a671f87d516362e3857

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\BEST NEW RAID TOOL\RTBFiles\attack_dict.py"
    1⤵
    • Modifies registry class
    PID:4240
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads