Resubmissions

14-10-2024 23:47

241014-3svm6awfjq 3

12-10-2024 03:01

241012-dhzrpayhra 10

Analysis

  • max time kernel
    61s
  • max time network
    54s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-es
  • resource tags

    arch:x64arch:x86image:win11-20241007-eslocale:es-esos:windows11-21h2-x64systemwindows
  • submitted
    14-10-2024 23:47

General

  • Target

    MonkeModManager (1).exe

  • Size

    217KB

  • MD5

    1d62aa3d19462f3d5575fc54159911b4

  • SHA1

    b37eab86c0075245fcc517a280f0705f6dffb852

  • SHA256

    6acaae0fb470790102a338e23dfe2263f31e529288e4efe51b34bca30371cb36

  • SHA512

    78a9501d7920920577a586396e5d9e2278a7c926448c9a98d7844db9032dbd887df90d2f389fe1754bf5a2071a19dfd5d40315624923e903ef9ef6cbb214b1df

  • SSDEEP

    3072:V9UmbMwyLMmJx+WAE090AF23P88RiiE090HjD:Kxs/E09hWPTE09yD

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MonkeModManager (1).exe
    "C:\Users\Admin\AppData\Local\Temp\MonkeModManager (1).exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:5024
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
    1⤵
      PID:3576
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

      Filesize

      10KB

      MD5

      23a27aaa2edf56e5fe043c73ffbd99ae

      SHA1

      de8021d3e4410d180c94be2bb61772c22a912b58

      SHA256

      92970d09d7d0261df5646fb6bb8c4455d9822eea86e07667266918c436ae0e89

      SHA512

      54a9677ba44e719c2360fd19ae5ea0f8450005dedd3fa05ad848399c724fb663495ed13eb21e7848f47c24aad8ca56fe46e76883f9b690bb2ad0ad482f130dc6

    • memory/5024-0-0x00007FF8A7D83000-0x00007FF8A7D85000-memory.dmp

      Filesize

      8KB

    • memory/5024-1-0x000001E6C6320000-0x000001E6C635C000-memory.dmp

      Filesize

      240KB

    • memory/5024-2-0x00007FF8A7D80000-0x00007FF8A8842000-memory.dmp

      Filesize

      10.8MB

    • memory/5024-3-0x00007FF8A7D80000-0x00007FF8A8842000-memory.dmp

      Filesize

      10.8MB

    • memory/5024-4-0x00007FF8A7D80000-0x00007FF8A8842000-memory.dmp

      Filesize

      10.8MB

    • memory/5024-5-0x00007FF8A7D83000-0x00007FF8A7D85000-memory.dmp

      Filesize

      8KB

    • memory/5024-6-0x00007FF8A7D80000-0x00007FF8A8842000-memory.dmp

      Filesize

      10.8MB