Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
x-ray
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
x-ray
Resource
win10v2004-20241007-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
x-ray
-
Size
22KB
-
MD5
a6410adcc2495f56a65f00bab53096f5
-
SHA1
0ca278b26d03bfa397542d1de563aab21b1b7022
-
SHA256
72282c79844f7d5f31b05571cadd14e4d32c55aef82d12d43aa70825d66ea2e6
-
SHA512
275d08667b879f3d501b919f5d2537657813eb219f9badbd75b29490cd655ddd52f2c0b1dd88cc4ce5cc7e59321a0bd836004875aa9f1dcf1b85ceec67670fdb
-
SSDEEP
384:q/mGk8MJ5L3+lGdcPTlBFH7g02e6mGB2t8Cp8Ig77rAYd8kjW7N6WDmF4s6T:0mGqPL3+lhZ/H772ejGdCre7crc80Ami
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\x-ray1⤵PID:596
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2172
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\x-ray1⤵
- Modifies registry class
PID:2392