Resubmissions

07-01-2025 19:20

250107-x14m5swqdr 1

06-01-2025 20:49

250106-zmb23szjgp 8

06-01-2025 20:34

250106-zcfyaayqbp 10

06-01-2025 20:12

250106-yyyjsawpbs 10

Analysis

  • max time kernel
    430s
  • max time network
    433s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06-01-2025 20:12

General

  • Target

    Resolute 16x/font/ascii_sga.png

  • Size

    4KB

  • MD5

    1aaab2144b27bff62f9fc29e1e63f7ba

  • SHA1

    fffa622509844f11e484757b7f4ff721f9ee1a57

  • SHA256

    2fad4288b675aa01a90d67f7b464c5928f699a6751ce8afbd8c1d27f8c8c2b2c

  • SHA512

    b7afc57f9b34da5dd71dd58c6e55c0363d6c46cc1ba03e2b89b9f112b3dec7b75d304b33b5aa173f1b9fc9de3437fe2cf02231cf4cb7d263c8c00658852ee3a0

  • SSDEEP

    96:UXHt+JcNgOSiS4XsAYNpf2ESNtnTzgRDZQYQ9uSnW/iMQ9u/:MoONgOLPXsAYnHtXQ9M/HQ9O

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Resolute 16x\font\ascii_sga.png"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3216
    • C:\Windows\system32\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\Resolute 16x\font\ascii_sga.png"
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3224
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
    1⤵
      PID:4504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads