Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 20:09

General

  • Target

    ScreamSploit.rar

  • Size

    12.6MB

  • MD5

    e4063e5213ff3964de248669f07250d5

  • SHA1

    ff2c6cf0869f5af23c347d07b51a4bc400b19775

  • SHA256

    973a7de712f8f0b54fdc85b839499175df6153b4f52de77c93106cb02f5b0fe5

  • SHA512

    e2769592ebc8bbf7d18a4abe9a9de54655d656a138da907e635a118df36098bf3a2027839673a00e8d74ccb6ac9489b3fe25a0fe64829001cca66178d6e79012

  • SSDEEP

    393216:9wmjdFD8EPZp0FCFHK6wSSZ4HT6CAaIobwXR85CFdpm:ppTmCFHK6da4HTLxqXRWCdm

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ScreamSploit.rar
    1⤵
    • Modifies registry class
    PID:4340
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads