Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02/09/2024, 18:34 UTC

General

  • Target

    Solaraً/workspace/.tests/getcustomasset.txt

  • Size

    7B

  • MD5

    260ca9dd8a4577fc00b7bd5810298076

  • SHA1

    53a5687cb26dc41f2ab4033e97e13adefd3740d6

  • SHA256

    aee408847d35e44e99430f0979c3357b85fe8dbb4535a494301198adbee85f27

  • SHA512

    51e85deb51c2b909a21ec5b8e83b1cb28da258b1be227620105a345a2bd4c6aea549cd5429670f2df33324667b9f623a420b3a0bdbbd03ad48602211e75478a7

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Solaraً\workspace\.tests\getcustomasset.txt
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Solaraً\workspace\.tests\getcustomasset.txt
      2⤵
        PID:2708

    Network

      No results found
    • 52.111.227.14:443
      322 B
      7
    No results found

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.