Analysis

  • max time kernel
    133s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/09/2024, 17:45

General

  • Target

    loop.txt

  • Size

    172B

  • MD5

    332210509e9fc44a28364e86334fa94a

  • SHA1

    e1f457a54db927b395627d3d66efe0b16006c4b6

  • SHA256

    686c86bbc75b96be19128cb12c980fc2573b0e8daeaa0f5485973e9a5418bb62

  • SHA512

    a3100d7a8209cd41d1242f18eb279cfddce6678ea5a666084656970f6549fa68add76cc5e07997394d0e377c8579d27302f5aa81511151054242ad10a5281dc4

Score
1/10

Malware Config

Signatures

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 33 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\loop.txt
    1⤵
    • Modifies registry class
    • Opens file in notepad (likely ransom note)
    • Suspicious use of SetWindowsHookEx
    PID:1184
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1624
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Documents\loop.bat" "
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3740
      • C:\Windows\system32\timeout.exe
        timeout 300
        2⤵
        • Delays execution with timeout.exe
        PID:916

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Documents\loop.bat

      Filesize

      172B

      MD5

      332210509e9fc44a28364e86334fa94a

      SHA1

      e1f457a54db927b395627d3d66efe0b16006c4b6

      SHA256

      686c86bbc75b96be19128cb12c980fc2573b0e8daeaa0f5485973e9a5418bb62

      SHA512

      a3100d7a8209cd41d1242f18eb279cfddce6678ea5a666084656970f6549fa68add76cc5e07997394d0e377c8579d27302f5aa81511151054242ad10a5281dc4