Analysis
-
max time kernel
41s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-es -
resource tags
arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows -
submitted
09-02-2023 22:41
Static task
static1
Behavioral task
behavioral1
Sample
Hoic.rar
Resource
win7-20220812-es
Behavioral task
behavioral2
Sample
Hoic.rar
Resource
win10v2004-20220812-es
Behavioral task
behavioral3
Sample
Hoic/hoic2.1.exe
Resource
win7-20220812-es
Behavioral task
behavioral4
Sample
Hoic/hoic2.1.exe
Resource
win10v2004-20220812-es
General
-
Target
Hoic.rar
-
Size
1.7MB
-
MD5
ba60fe26a85d5f5b6338d562930aeff2
-
SHA1
499b6643dd5a7f1dd4d57506041c1207e657bce0
-
SHA256
59e0d15fcdf92551a204c7e71776a88f54ea9df74e2ba2cfb04e7582c04dec81
-
SHA512
2fcc74e1c44ae2a9829d53eb6f7946965ad6f8d88b2ebaf8df223c881b99066c155cc94a3c566cfe08ebfe1eded6615df410ee30dc0c9877aba1c9daa44217ec
-
SSDEEP
49152:YQs04R8oXUEgIRnwN/INLZw8NoibprkwSIdwHQa:zSRYfNANLZw8NLbZudh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 268 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 268 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 268 vlc.exe 268 vlc.exe 268 vlc.exe 268 vlc.exe 268 vlc.exe 268 vlc.exe 268 vlc.exe 268 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 268 vlc.exe 268 vlc.exe 268 vlc.exe 268 vlc.exe 268 vlc.exe 268 vlc.exe 268 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 268 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1104 1120 cmd.exe 29 PID 1120 wrote to memory of 1104 1120 cmd.exe 29 PID 1120 wrote to memory of 1104 1120 cmd.exe 29 PID 1104 wrote to memory of 268 1104 rundll32.exe 30 PID 1104 wrote to memory of 268 1104 rundll32.exe 30 PID 1104 wrote to memory of 268 1104 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Hoic.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Hoic.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Hoic.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:268
-
-