Analysis

  • max time kernel
    150s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2023 00:24

General

  • Target

    Undertale/mus_undynetruetheme.ogg

  • Size

    935KB

  • MD5

    a406b15d0e513ab4cfa25177dae99561

  • SHA1

    b806ae43e0d3e1e94eb074217dc0c7d32fa4ab33

  • SHA256

    795cafff0fd78abc5bc55ca5e556f8839d20daddf1a4023e3183f70c3329ff4f

  • SHA512

    6e5039b053aa67b51e48f1ac026a815909f0942def7b22d7a1549a518f70fc40b317075e6a6ba8c096082542d4a0caf738bcd6514c7c59961713c2643c35ecad

  • SSDEEP

    24576:jB1IsB8JDJ7NkfiuNY6iUTwSvzaKY5mUoWO4DKQhN:j0sBqN7Eq0MSWKY5mUoWOgKON

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Undertale\mus_undynetruetheme.ogg
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3528
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Undertale\mus_undynetruetheme.ogg"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3812
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f8 0x508
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3812-133-0x00007FF6C8700000-0x00007FF6C87F8000-memory.dmp

    Filesize

    992KB

  • memory/3812-134-0x00007FF90D0A0000-0x00007FF90D0D4000-memory.dmp

    Filesize

    208KB

  • memory/3812-135-0x00007FF90B300000-0x00007FF90B5B4000-memory.dmp

    Filesize

    2.7MB

  • memory/3812-138-0x00007FF90B300000-0x00007FF90B5B4000-memory.dmp

    Filesize

    2.7MB

  • memory/3812-140-0x00007FF90C060000-0x00007FF90C077000-memory.dmp

    Filesize

    92KB

  • memory/3812-139-0x00007FF90C950000-0x00007FF90C968000-memory.dmp

    Filesize

    96KB

  • memory/3812-141-0x00007FF90B870000-0x00007FF90B881000-memory.dmp

    Filesize

    68KB

  • memory/3812-142-0x00007FF90B850000-0x00007FF90B867000-memory.dmp

    Filesize

    92KB

  • memory/3812-144-0x00007FF90B810000-0x00007FF90B82D000-memory.dmp

    Filesize

    116KB

  • memory/3812-143-0x00007FF90B830000-0x00007FF90B841000-memory.dmp

    Filesize

    68KB

  • memory/3812-145-0x00007FF90B7F0000-0x00007FF90B801000-memory.dmp

    Filesize

    68KB

  • memory/3812-146-0x00007FF90AE70000-0x00007FF90B070000-memory.dmp

    Filesize

    2.0MB

  • memory/3812-147-0x000001E470360000-0x000001E47140B000-memory.dmp

    Filesize

    16.7MB

  • memory/3812-148-0x00007FF90B780000-0x00007FF90B7BF000-memory.dmp

    Filesize

    252KB

  • memory/3812-149-0x00007FF909CD0000-0x00007FF909CF1000-memory.dmp

    Filesize

    132KB

  • memory/3812-150-0x00007FF909CB0000-0x00007FF909CC8000-memory.dmp

    Filesize

    96KB

  • memory/3812-152-0x00007FF909C70000-0x00007FF909C81000-memory.dmp

    Filesize

    68KB

  • memory/3812-151-0x00007FF909C90000-0x00007FF909CA1000-memory.dmp

    Filesize

    68KB

  • memory/3812-153-0x00007FF909C50000-0x00007FF909C61000-memory.dmp

    Filesize

    68KB

  • memory/3812-154-0x00007FF909C30000-0x00007FF909C4B000-memory.dmp

    Filesize

    108KB

  • memory/3812-155-0x00007FF909C10000-0x00007FF909C21000-memory.dmp

    Filesize

    68KB

  • memory/3812-156-0x00007FF909BF0000-0x00007FF909C08000-memory.dmp

    Filesize

    96KB

  • memory/3812-157-0x00007FF909BC0000-0x00007FF909BF0000-memory.dmp

    Filesize

    192KB

  • memory/3812-158-0x00007FF909B50000-0x00007FF909BB7000-memory.dmp

    Filesize

    412KB

  • memory/3812-166-0x00007FF90B300000-0x00007FF90B5B4000-memory.dmp

    Filesize

    2.7MB

  • memory/3812-175-0x000001E470360000-0x000001E47140B000-memory.dmp

    Filesize

    16.7MB

  • memory/3812-187-0x00007FF909A80000-0x00007FF909AEF000-memory.dmp

    Filesize

    444KB

  • memory/3812-189-0x00007FF909A00000-0x00007FF909A5C000-memory.dmp

    Filesize

    368KB

  • memory/3812-190-0x00007FF9099A0000-0x00007FF9099F6000-memory.dmp

    Filesize

    344KB

  • memory/3812-191-0x00007FF909970000-0x00007FF909998000-memory.dmp

    Filesize

    160KB

  • memory/3812-193-0x00007FF909920000-0x00007FF909937000-memory.dmp

    Filesize

    92KB

  • memory/3812-195-0x00007FF9098D0000-0x00007FF9098E1000-memory.dmp

    Filesize

    68KB

  • memory/3812-199-0x00007FF909840000-0x00007FF909852000-memory.dmp

    Filesize

    72KB

  • memory/3812-200-0x00007FF909700000-0x00007FF90983B000-memory.dmp

    Filesize

    1.2MB

  • memory/3812-201-0x00007FF9096D0000-0x00007FF9096FC000-memory.dmp

    Filesize

    176KB

  • memory/3812-198-0x00007FF909860000-0x00007FF909873000-memory.dmp

    Filesize

    76KB

  • memory/3812-197-0x00007FF909880000-0x00007FF9098A1000-memory.dmp

    Filesize

    132KB

  • memory/3812-196-0x00007FF9098B0000-0x00007FF9098C2000-memory.dmp

    Filesize

    72KB

  • memory/3812-194-0x00007FF9098F0000-0x00007FF909913000-memory.dmp

    Filesize

    140KB

  • memory/3812-192-0x00007FF909940000-0x00007FF909964000-memory.dmp

    Filesize

    144KB

  • memory/3812-188-0x00007FF909A60000-0x00007FF909A71000-memory.dmp

    Filesize

    68KB