Resubmissions

21-11-2024 16:37

241121-t4391atakf 1

21-11-2024 12:27

241121-pmq6ws1gqc 3

21-11-2024 12:24

241121-plagraskfy 7

21-11-2024 12:05

241121-n9fg8s1frd 3

21-11-2024 12:02

241121-n7wrfasjgt 4

21-11-2024 11:13

241121-nbg86sscnm 4

21-11-2024 11:10

241121-m9p61ascmj 4

21-11-2024 10:56

241121-m1w8yswlak 3

Analysis

  • max time kernel
    147s
  • max time network
    203s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-11-2024 12:05

General

  • Target

    LIL BOT.txt

  • Size

    161B

  • MD5

    af501636888bf06a8bb61dc6495f7958

  • SHA1

    e743bbec7ffec3cb50cf6fe8e5a7c4a87dad1fb3

  • SHA256

    fa976ddfc32c90662d7c89401197c650d5b243859e0c0d6ef66c7cdd66644bfb

  • SHA512

    52345fc030037f113f55576224ea196a686a688bd97e54a509830f5b6719c546e249e6694ebda396f25a22d1d468c003c04875a0c8cac6f78746a5dbbb9c505a

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\LIL BOT.txt"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\LIL BOT.txt
      2⤵
        PID:748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads