Analysis
-
max time kernel
17s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-08-2024 03:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
rbxgem.rar
Resource
win11-20240802-en
windows11-21h2-x64
4 signatures
150 seconds
General
-
Target
rbxgem.rar
-
Size
10.1MB
-
MD5
0e157d447782b16752fc12c1ca1056b0
-
SHA1
5bf95acd8471f1c17f797770ba741e8a54b18571
-
SHA256
3f9b142b763b624fb2d95dabdf9e3516691e3309c5a5d0e063ec996fda323348
-
SHA512
fe91517c85bc2c01338a952b05b51d87a3bfa2ea1f7ce0c1d89cf80a30ff3e80742a1df9f68c1fb7e282669bfb764ff4c87ee66181394dfeb05e5e06914d2eed
-
SSDEEP
196608:Ra89fjNOVKZ3RWvtvj6N+gweRfa9LBYjNyCTdjxmEppRg/ewPdqc6wr:HtjZ3RWvcgH9LB/CTdjkOpRwPdt6A
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3684 OpenWith.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe 3684 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\rbxgem.rar1⤵
- Modifies registry class
PID:696
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3684
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2344