Analysis

  • max time kernel
    420s
  • max time network
    438s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-09-2024 09:35

General

  • Target

    package.json

  • Size

    406B

  • MD5

    d4405c45ed41c3af9826822dd0ad2d07

  • SHA1

    a297b186ae289ea7062f5202ed909390060a285c

  • SHA256

    54dc2e1518932e88b7dd1526b35f045f38ea9621dc7b6830fb04a71af1a6d25e

  • SHA512

    0d05daba46a58b338d5adc9918d3fec7863e43e1b6d4b8e1ec1a51ebdfd03e53dabf6d039d2db6d2c5d6df31cb27a0999a1615846367d2c3a53af40034667acf

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\package.json
    1⤵
    • Modifies registry class
    PID:3932
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads