Analysis
-
max time kernel
107s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-12-2024 14:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
burppack3-2024.rar
Resource
win11-20241007-en
windows11-21h2-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Read-me.txt
Resource
win11-20241007-en
windows11-21h2-x64
3 signatures
150 seconds
General
-
Target
Read-me.txt
-
Size
79B
-
MD5
4d95d65bae99fc01b6525c3fabcef7d2
-
SHA1
c363cee70aef9b36aa7e8764e42a8f24d056a3ca
-
SHA256
e947678ddca921f4d1c34505b4e944cb175001491a0211633be78ba15208973a
-
SHA512
f9aec8f5ce501f7e32f498cbfa6f6b2d12647ff164a7b0e951052b609921a0971e08d42270024f58767cbdbaabbbb00fc59e8737bdbe9abc54976f4e1d8ec011
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3724 3904 cmd.exe 78 PID 3904 wrote to memory of 3724 3904 cmd.exe 78