Resubmissions

02/03/2025, 00:51

250302-a7g2dsysds 7

02/03/2025, 00:49

250302-a6r5zaymw2 10

02/03/2025, 00:48

250302-a5tx6syms4 3

01/03/2025, 11:30

250301-nmf59azrs3 10

Analysis

  • max time kernel
    67s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02/03/2025, 00:48

General

  • Target

    load.sh

  • Size

    129B

  • MD5

    b165b7f155810af7139dd707d2e151c9

  • SHA1

    a49fe736dd310d0a64f3628c744c590fd7c43bdc

  • SHA256

    d21adb4e0938c18241d225748676e9f73c5a81210be881841b3b22c6e6abe9b4

  • SHA512

    8256ac2815b643527aae2410fa26a4179c22b793d028b402b2077fd57031e48f2457f6a07a6a0f53e479a3781ac466f248e58114dd38e35793ac3364e07a177c

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 29 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\load.sh
    1⤵
      PID:1756
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1000
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4344

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads