Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 19:17

General

  • Target

    shrpubw.exe

  • Size

    46KB

  • MD5

    e2f46d6d4fc087a12e2228b6ded36033

  • SHA1

    14cacc8c56dde44fe7306a1327094bf396ef4962

  • SHA256

    c7329ce3412bd26fc2f5e6e553a3e0723488ab9f5e8f05effc8fef557803471d

  • SHA512

    5c6b9ec539648b0e5733ea17ecd66ac7eea5dabb95a5c8067b30bcff5efdf566b2419f85ac97cc69cf26b0fd95a260a1281bf3e7979690080630e3de416f7e2f

  • SSDEEP

    768:hA5LxFRN3wD3kYuq3y0RtgcmT+EL1I/SAAJV8gSE+ZTr+J18yqv:i5LxFR67Buq3V+t+6iSzV8Lr+n8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\shrpubw.exe
    "C:\Users\Admin\AppData\Local\Temp\shrpubw.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3104
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4212,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=3852 /prefetch:8
    1⤵
      PID:2544

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads