Resubmissions
12/03/2025, 20:09
250312-yw9t2a1zat 307/11/2024, 23:04
241107-22pb3ayqgx 807/11/2024, 23:02
241107-21g7cssnfq 3Analysis
-
max time kernel
4s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/03/2025, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document.txt
Resource
win11-20250217-en
3 signatures
900 seconds
General
-
Target
New Text Document.txt
-
Size
5KB
-
MD5
10ba94fdebae02808f337278545863c5
-
SHA1
41a6c3fa747082c9b730cbab48814f70756796d0
-
SHA256
f9fc805eb47ae743c874ff3c9b4447aed11e14e9fa78399a52e7c8ba6f9a4512
-
SHA512
62871511bcf1c437d8fec2370c52cfb076f3a7b268c04ce20490acba83da6a51fb7e4d12b0d1f706a18995b5382fdbac6d9f9381178578be5494bd9091cd0211
-
SSDEEP
96:7qS/wHjQ+zC+26TArMA2Q8BL/paYx3pjzxhy/MfJCY4m91/s91WP9zD91XG91U5N:2S/kHvABm0MFDJV+w0Ays
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-580533235-1933962784-2718464258-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4932 4860 cmd.exe 82 PID 4860 wrote to memory of 4932 4860 cmd.exe 82
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\New Text Document.txt"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\New Text Document.txt2⤵PID:4932
-