Resubmissions

05-02-2025 09:34

250205-lj3hzaskdm 1

02-02-2025 14:19

250202-rmz5xavnfw 4

02-02-2025 14:17

250202-rl3veavnc1 4

02-02-2025 00:22

250202-an9bjaynfr 10

02-02-2025 00:12

250202-ahevqsylfm 10

02-02-2025 00:08

250202-ae1m2awpbt 10

02-02-2025 00:04

250202-acl2vsykbm 10

Analysis

  • max time kernel
    425s
  • max time network
    536s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250128-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    02-02-2025 14:19

General

  • Target

    b231263f-0b92-4f02-9e71-3d6a05534490.jpg

  • Size

    26KB

  • MD5

    99cfb36285d82796d745c8a199f6acff

  • SHA1

    ab990d5b00d7878178a6e77553152149ce4f56c3

  • SHA256

    afc3ff71d364c14eecc12918e7c00a435943005fc86dafa53da529f0a9c95285

  • SHA512

    3a9558a9e628aac5af58f98a9e7056fe5a2741517067f0f9ebac9a800d6bd564433ab0b3910746f99e82573d2ba176241ce3d3b25961a6c27ae828c0d4defd26

  • SSDEEP

    768:Z3Bt4w6U03dxH1/ARsjefQIbwTj5pW0JPfmXkD+lakhXOsX0:Z3BtNZAdxHdARkef7bQ5I8POEqY

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Windows\system32\mspaint.exe
    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\b231263f-0b92-4f02-9e71-3d6a05534490.jpg"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4288
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
    1⤵
      PID:5056

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads