Resubmissions

20/04/2025, 09:15

250420-k8b7mstlz9 10

20/04/2025, 09:09

250420-k4v4ystlt6 4

Analysis

  • max time kernel
    152s
  • max time network
    291s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2025, 09:09

General

  • Target

    data/brotli/encode.h

  • Size

    19KB

  • MD5

    4427cb791804f9f0be1981ad0b32670f

  • SHA1

    381923a5713227759c4af75dc77412edf8cf48dd

  • SHA256

    3403a597eff24ff45903128feb471e4dd5138f624104ebe058a9d90ed905550c

  • SHA512

    e0bdc53ac96f23be69b1e5321c9e3ada6aa1305e44db295579366fd25ca5eadca85a434201d5af9b1d9e4edd48c1fd524df97e27b44dba16c0bf49ca4023cf47

  • SSDEEP

    384:f0u8/K++EoPGiCDtVt2H2xpSxpbpSMrEgyNT62PA0bU5sAGHHBci:fJ8K++zLgt2H2PipVQgyNBNAGHhN

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\data\brotli\encode.h
    1⤵
    • Modifies registry class
    PID:3032
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3280

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads