Analysis
-
max time kernel
443s -
max time network
445s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
31-12-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
Edge Passwords.txt
Resource
win10ltsc2021-20241211-en
windows10-ltsc 2021-x64
11 signatures
600 seconds
Behavioral task
behavioral2
Sample
Edge Passwords.txt
Resource
win11-20241007-en
windows11-21h2-x64
3 signatures
600 seconds
General
-
Target
Edge Passwords.txt
-
Size
8KB
-
MD5
a4f4d5146368f3b15a6d30eaa089cf81
-
SHA1
bc610aaf7af3f53198f2c84d80ffb8c859659d1b
-
SHA256
6b01781c1eab825263d48fd257615ec4088fad0563798d282e6343c578b7dd2a
-
SHA512
7db6784a6b0821375cbe7f4103aa620c2666d4a945bdf5a55b71d4ca04109576f16522a9a7dbcf2f099ed4c2331d4f44ebeb11811152cd110894b2801232d3e8
-
SSDEEP
192:wFuVrxniyBWqQBWoIziN9BBF1qjNuyzzsgZfLO1oJZbeXypagGHQ2hqK5SjnBpdj:RsgxRzX
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3108 wrote to memory of 1872 3108 cmd.exe 80 PID 3108 wrote to memory of 1872 3108 cmd.exe 80
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Edge Passwords.txt"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Edge Passwords.txt2⤵PID:1872
-