Analysis

  • max time kernel
    96s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 00:59

General

  • Target

    UnbanTool-main/example_.4165A294.tlog/link.write.1.tlog

  • Size

    3KB

  • MD5

    46f02cff3bb089279d5506e11628010e

  • SHA1

    f83551a93b7ca8f07695612d0f434f20bbb37cc5

  • SHA256

    99f0f85d0cc0d828181a7a223829e76f37621821464177e8b6cadc28ccb3987f

  • SHA512

    259b03ff514e2975bb212f52eb0aa6e41ed6647e4de17a409c762c22c73ada0cecb63f191c4abb2646a316dba0a41b30acce31b3c7f7459ac8299550baa16efb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\UnbanTool-main\example_.4165A294.tlog\link.write.1.tlog
    1⤵
    • Modifies registry class
    PID:3680
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads