Resubmissions

12/08/2024, 02:35

240812-c27e7swarg 10

12/08/2024, 02:32

240812-c1dfqs1ekk 10

Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12/08/2024, 02:32

General

  • Target

    Platform/AmMonitoringInstall.mof

  • Size

    9KB

  • MD5

    1fc6f870588fef1b38ba900026be8828

  • SHA1

    6075bc55198d9a0d75a4d7db20b7b2d8ad47a466

  • SHA256

    a24dd47738189ca55a5137a49fd1246418bc1c589a4294b79dfcc4d2a79c9098

  • SHA512

    530a02081ecfbab6ab59c904874c604263975174626980bfe445371540e999754a2dd204a003d79c8f7e5ff1d5c420e2cb93bf36b527dfbf774638fe923b62d8

  • SSDEEP

    192:0kJH/0e6Y/WnPqLO0OKcie0lmkLgJsJ+LjtU+J3I:FBf6Yyf09MnkEeAu

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Platform\AmMonitoringInstall.mof
    1⤵
    • Modifies registry class
    PID:3528
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2516

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads