Analysis
-
max time kernel
130s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 22:08
Behavioral task
behavioral1
Sample
b60e46292055f6246419ed3c937dacc4840b268ea145de6775ac966b368ab6c2.bin
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b60e46292055f6246419ed3c937dacc4840b268ea145de6775ac966b368ab6c2.bin
Resource
win10v2004-20250217-en
General
-
Target
b60e46292055f6246419ed3c937dacc4840b268ea145de6775ac966b368ab6c2.bin
-
Size
3.6MB
-
MD5
1d06e8971572f47b337944669061c280
-
SHA1
3245e74e026b483dc07adf8286c9309a949dab1d
-
SHA256
b60e46292055f6246419ed3c937dacc4840b268ea145de6775ac966b368ab6c2
-
SHA512
0c6b94651ce6236cbd828f8c7fac666f47254a541c4bea7bfd1c81301c0f010a1b573d2e8b4e64ea6516ff5c15d254ad761001d026f586ab4dcfd2b4676f95ab
-
SSDEEP
12288:rozA2n9dH5M2vkm0aFRv3pId9Ry9EvZJT3CqQrhryfQNRPaCieMjdvCJv1Vi0Zol:ro+Yvh1X/2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4408 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\b60e46292055f6246419ed3c937dacc4840b268ea145de6775ac966b368ab6c2.bin1⤵
- Modifies registry class
PID:2588
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4408