Analysis
-
max time kernel
40s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
05/08/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
ClearVision_v6.theme.css
Resource
win10-20240404-en
4 signatures
150 seconds
General
-
Target
ClearVision_v6.theme.css
-
Size
9KB
-
MD5
1621407b778442349916afeebb9dc437
-
SHA1
c950be93aaa73a2eed2df2dfcf68e9e7f714ba0c
-
SHA256
f5de3c84fba11fa37f60ab3918472a9fa4c382e2ff760571f1d01f5bbd3ca3eb
-
SHA512
eba255b73995af055424ba3b56844ac5afb5744c493c5861155edd49999ea7c4057c51077d5e5de71b57938f8900219d2ff1e50ee89a453c4609160c669e1ac0
-
SSDEEP
96:0cCFSvQTq+u9kJ7JpARjfISMBekq4bpq2m7ckyOJzbTnHfHaMcHt97R3jQjRFfio:NCFSodu9ANuTalq4bpU7cZHvFcZjt
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4924 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4924 4904 cmd.exe 73 PID 4904 wrote to memory of 4924 4904 cmd.exe 73
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ClearVision_v6.theme.css1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ClearVision_v6.theme.css2⤵
- Opens file in notepad (likely ransom note)
PID:4924
-