Analysis
-
max time kernel
439s -
max time network
437s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/03/2025, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
scenes i like.txt
Resource
win10v2004-20250314-en
25 signatures
900 seconds
Behavioral task
behavioral2
Sample
scenes i like.txt
Resource
win11-20250314-en
3 signatures
900 seconds
General
-
Target
scenes i like.txt
-
Size
43B
-
MD5
9fb8c41a40b9fc3b57825d8acdaeb71f
-
SHA1
6d4a793f867088b9c44e321ae8add32c7d9148ff
-
SHA256
56387eb89c61959a06f8d96544dd4ca182fb17986b0fa3d139d7fb0d96c5080b
-
SHA512
dc3ef7a27d224dc2ad2fc6732f2c1c0d0b1b85288c28c42ac0262afa8068d17680497c6bbbe34ac9e3224b95091b9b23a80c6a0a93356806db1329bf7000c915
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5948 wrote to memory of 3236 5948 cmd.exe 79 PID 5948 wrote to memory of 3236 5948 cmd.exe 79
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\scenes i like.txt"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5948 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\scenes i like.txt2⤵PID:3236
-