Analysis
-
max time kernel
33s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
S0FTWARE.rar
Resource
win10v2004-20240802-en
windows10-2004-x64
4 signatures
1800 seconds
Behavioral task
behavioral2
Sample
S0FTWARE.rar
Resource
win11-20240802-en
windows11-21h2-x64
4 signatures
1800 seconds
General
-
Target
S0FTWARE.rar
-
Size
19.3MB
-
MD5
4b94df86147707037e982d600e501f61
-
SHA1
085db8841a38af2e90278773dd9a8c64499b0240
-
SHA256
c3bce29df10f3a8228fd49b1bcc8e913193fa55a44a7e8abe418235f0ccb2f32
-
SHA512
5a378edc044e6eee29e68288b631d2ee616d5788e4ccc40d6ad344b450987e1c05a4f907bbc72a5a5edcbdd60bee0cf3dba244154534786c0f687569008932a2
-
SSDEEP
393216:ZtE4z7iZOSZTZakcGUbTVMFFcMB6Jo3rs5p2fPtA6/2P0sompqd94eyR4:HEhOSZRUH+bf/sv2f1120soeqdNyO
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4912 OpenWith.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe 4912 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\S0FTWARE.rar1⤵
- Modifies registry class
PID:3828
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4912
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4864