Resubmissions

23/08/2024, 16:00

240823-tf47dsteqe 6

23/08/2024, 15:32

240823-sy293sseld 4

23/08/2024, 15:18

240823-sp1d5athqk 8

23/08/2024, 14:12

240823-rjcv7sydnd 7

23/08/2024, 02:33

240823-c17dta1cpd 7

23/08/2024, 02:11

240823-cmbpzszelg 4

23/08/2024, 02:00

240823-ce59mazbnh 4

23/08/2024, 01:37

240823-b1992a1dmm 5

23/08/2024, 01:24

240823-bsm5jazhpp 5

23/08/2024, 00:51

240823-a7p21awhld 6

Analysis

  • max time kernel
    143s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 16:00

General

  • Target

    ShellAppRuntime.exe

  • Size

    1.4MB

  • MD5

    130017fc71bbc867cf39b9dec1841a5b

  • SHA1

    d18c5e06b2874b2bb128595c023cea2300153114

  • SHA256

    c7cdf62ada99ddc6ed42dd28b5a01d3dfa3c1fb7b2f19db07345a5b4fdf2b366

  • SHA512

    f1c2555637a5040f4d6ff71b895a7b43df1dfaa58cd3dca5169c2acf2708e1c5cb3f65f1d12258667d1e7481c859d52d2c38afa42ff63566fb4baea3f3918637

  • SSDEEP

    24576:fl8cLQKkBxnBajp8Y77W40omILNI+dujhZA3+CJL3GCHModYv4HGAYBdrulzndyS:t8cLQKkB0p8Y7WoVdmZA3+CJL31TDGA9

Score
6/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ShellAppRuntime.exe
    "C:\Users\Admin\AppData\Local\Temp\ShellAppRuntime.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Checks system information in the registry
    PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads