Analysis

  • max time kernel
    196s
  • max time network
    304s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-07-2024 13:20

General

  • Target

    maizu hack v1.4.rar

  • Size

    403KB

  • MD5

    45768dbe40703c4545fc0c1a0f431019

  • SHA1

    68c53d26c48f31bd61042f8b7071c5bb6b78b0da

  • SHA256

    cb1bcf331721008e6dd6b46cd0f1880612374d54403836f43f264f924789e610

  • SHA512

    c984cc4032e0d276d63a34bc03563f422ca3e258a72a9d734304662b268577af873b33f5bfdc3f8a7e2e34ddd391c99a436a865842b502a9649a141242355a4a

  • SSDEEP

    12288:GJwSrUZSQmEyLvIg8eoCrOT70Xr1w4pLZgeOTn+:GWeUZSQZCXo7wXrmSLmDa

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\maizu hack v1.4.rar"
    1⤵
    • Modifies registry class
    PID:5116
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\maizu hack v1.4.rar
      2⤵
        PID:2228

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads