Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-11-2024 18:35

General

  • Target

    Forlorn Executor.exe.WebView2/EBWebView/Speech Recognition/1.15.0.1/manifest.fingerprint

  • Size

    66B

  • MD5

    5bbd09242392aacbb5fac763f9e3bd4e

  • SHA1

    14bb7b23b459ce30193742ed1901a17b4dcf9645

  • SHA256

    22b55f5d9b1bafb80e00c1304cf5e0d6057a304a2e8757b4f021b416f4397297

  • SHA512

    541e4c7998e91a5113f627c2c44e32b54878fe225b3b9476572f025f51f2b4ec4a44b102498adcc22b8fe388970645bacfafb6e7fc8a216df4d7bbfc8b0ff670

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Forlorn Executor.exe.WebView2\EBWebView\Speech Recognition\1.15.0.1\manifest.fingerprint"
    1⤵
    • Modifies registry class
    PID:2892
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads